414 resultados para Type of misspellings
Resumo:
Emission rates of ammonia (NH3) are reported for a fleet of 130 light-, medium-, and heavy-duty vehicles recruited in Guangzhou, China. NH3 measurements were performed using Nessler's Reagents spectrophotometry and nationwide standard chassis dynamometer test cycles required by Chinese EPA. Emissions of CO and NOx were also measured during these test cycles. Emission factors of NH3 were calculated for each type of vehicle and used to estimate the total emissions of NH3 from motor vehicles in Guangzhou (GZ) in 2009. Emission factors of NH3 show large variations among different categories of vehicles, with a range from 4 to 138 mg km-1. The average emissions of NH3 in Guangzhou in 2009 were estimated to be 983 t, with a range from 373 to 2136 t. In addition, it was found that vehicles with the highest NH3 emission rates possess the following characteristics: mediumand heavy-duty vehicles, certified with out-of-date emission standards, mid-range odometer readings, and higher CO and NOx emission rates. The results of this study will be useful for developing NH3 emissions inventories in Guangzhou and other urban areas in China.
Resumo:
Strike-slip faults commonly display structurally complex areas of positive or negative topography. Understanding the development of such areas has important implications for earthquake studies and hydrocarbon exploration. Previous workers identified the key factors controlling the occurrence of both topographic modes and the related structural styles. Kinematic and stress boundary conditions are of first-order relevance. Surface mass transport and material properties affect fault network structure. Experiments demonstrate that dilatancy can generate positive topography even under simple-shear boundary conditions. Here, we use physical models with sand to show that the degree of compaction of the deformed rocks alone can determine the type of topography and related surface fault network structure in simple-shear settings. In our experiments, volume changes of ∼5% are sufficient to generate localized uplift or subsidence. We discuss scalability of model volume changes and fault network structure and show that our model fault zones satisfy geometrical similarity with natural flower structures. Our results imply that compaction may be an important factor in the development of topography and fault network structure along strike-slip faults in sedimentary basins.
Resumo:
Advanced composite materials offer remarkable potential in the strengthening of Civil Engineering structures. This research is targeted to provide in depth knowledge and understanding of bond characteristics of advanced and corrosion resistant material carbon fibre reinforced polymer (CFRP) that has a unique design tailor-ability and cost effective nature. The objective of this research is to investigate and compare the bonding mechanism between CFRP strengthened single and double strap steel joints. Investigations have been made in regards to failure mode, ultimate load and effective bond length for CFRP strengthened double and single strap joints. A series of tensile tests were conducted with different bond lengths for both type of joints. The bond behaviour of these specimens was further investigated by using nonlinear finite element analysis. Finally a bilinear relationship of shear stress-slip has been proposed by using the Finite element model for single and double strap joints.
Resumo:
Eccentric exercise commonly results in muscle damage. The primary sequence of events leading to exercise-induced muscle damage is believed to involve initial mechanical disruption of sarcomeres, followed by impaired excitation-contraction coupling and calcium signaling, and finally, activation of calcium-sensitive degradation pathways. Muscle damage is characterized by ultrastructural changes to muscle architecture, increased muscle proteins and enzymes in the bloodstream, loss of muscular strength and range of motion and muscle soreness. The inflammatory response to exercise-induced muscle damage is characterized by leukocyte infiltration and production of pro-inflammatory cytokines within damaged muscle tissue, systemic release of leukocytes and cytokines, in addition to alterations in leukocyte receptor expression and functional activity. Current evidence suggests that inflammatory responses to muscle damage are dependent on the type of eccentric exercise, previous eccentric loading (repeated bouts), age and gender. Circulating neutrophil counts and systemic cytokine responses are greater after eccentric exercise using a large muscle mass (e.g. downhill running, eccentric cycling) than after other types of eccentric exercise involving a smaller muscle mass. After an initial bout of eccentric exercise, circulating leukocyte counts and cell surface receptor expression are attenuated. Leukocyte and cytokine responses to eccentric exercise are impaired in elderly individuals, while cellular infiltration into skeletal muscle is greater in human females than males after eccentric exercise. Whether alterations in intracellular calcium homeostasis influence inflammatory responses to muscle damage is uncertain. Furthermore, the effects of antioxidant supplements are variable, and the limited data available indicates that anti-inflammatory drugs largely have no influence on inflammatory responses to eccentric exercise. In this review, we compare local versus systemic inflammatory responses, and discuss some of the possible mechanisms regulating the inflammatory responses to exercise-induced muscle damage in humans.
Resumo:
Background: Measurement accuracy is critical for biomechanical gait assessment. Very few studies have determined the accuracy of common clinical rearfoot variables between cameras with different collection frequencies. Research question: What is the measurement error for common rearfoot gait parameters when using a standard 30Hz digital camera compared to 100Hz camera? Type of study: Descriptive. Methods: 100 footfalls were recorded from 10 subjects ( 10 footfalls per subject) running on a treadmill at 2.68m/s. A high-speed digital timer, accurate within 1ms served as an external reference. Markers were placed along the vertical axis of the heel counter and the long axis of the shank. 2D coordinates for the four markers were determined from heel strike to heel lift. Variables of interest included time of heel strike (THS), time of heel lift (THL), time to maximum eversion (TMax), and maximum rearfoot eversion angle (EvMax). Results: THS difference was 29.77ms (+/- 8.77), THL difference was 35.64ms (+/- 6.85), and TMax difference was 16.50ms (+/- 2.54). These temporal values represent a difference equal to 11.9%, 14.3%, and 6.6% of the stance phase of running gait, respectively. EvMax difference was 1.02 degrees (+/- 0.46). Conclusions: A 30Hz camera is accurate, compared to a high-frequency camera, in determining TMax and EvMax during a clinical gait analysis. However, relatively large differences, in excess of 12% of the stance phase of gait, for THS and THL variables were measured.
Resumo:
Background: Studies on the relationship between performance and design of the throwing frame have been limited and therefore require further investigation. Objectives: The specific objectives were to provide benchmark information about performance and whole body positioning of male athletes in F30s classes. Study Design: Descriptive analysis. Methods: A total of 48 attempts performed by 12 stationary discus throwers in F33 and F34 classes during seated discus throwing event of 2002 International Paralympic Committee Athletics World Championships were analysed in this study. The whole body positioning included overall throwing posture (i.e. number of points of contact between the thrower and the frame, body position, throwing orientation and throwing side) and lower limb placements (i.e. seating arrangements, points of contact on the both feet, type of attachment of both legs and feet). Results: Three (25%), five (42%), one (8%) and three (25%) athletes used from three to six points of contact, respectively. Seven (58%) and five (42%) athletes threw from a standing or a seated position, respectively. A straddle, a stool or a chair was used by six (50%), four (33%) or two (17%) throwers, respectively. Conclusions: This study provides key information for a better understanding of the interaction between throwing technique of elite seated throwers and their throwing frame.
Resumo:
This paper presents a recursive strategy for online detection of actuator faults on a unmanned aerial system (UAS) subjected to accidental actuator faults. The proposed detection algorithm aims to provide a UAS with the capability of identifying and determining characteristics of actuator faults, offering necessary flight information for the design of fault-tolerant mechanism to compensate for the resultant side-effect when faults occur. The proposed fault detection strategy consists of a bank of unscented Kalman filters (UKFs) with each one detecting a specific type of actuator faults and estimating correspond- ing velocity and attitude information. Performance of the proposed method is evaluated using a typical nonlinear UAS model and it is demonstrated in simulations that our method is able to detect representative faults with a sufficient accuracy and acceptable time delay, and can be applied to the design of fault-tolerant flight control systems of UASs.
Resumo:
Aim To provide an overview of key governance matters relating to medical device trials and practical advice for nurses wishing to initiate or lead them. Background Medical device trials, which are formal research studies that examine the benefits and risks of therapeutic, non-drug treatment medical devices, have traditionally been the purview of physicians and scientists. The role of nurses in medical device trials historically has been as data collectors or co-ordinators rather than as principal investigators. Nurses more recently play an increasing role in initiating and leading medical device trials. Review Methods A review article of nurse-led trials of medical devices. Discussion Central to the quality and safety of all clinical trials is adherence to the International Conference on Harmonization Guidelines for Good Clinical Practice, which is the internationally-agreed standard for the ethically- and scientifically-sound design, conduct and monitoring of a medical device trial, as well as the analysis, reporting and verification of the data derived from that trial. Key considerations include the class of the medical device, type of medical device trial, regulatory status of the device, implementation of standard operating procedures, obligations of the trial sponsor, indemnity of relevant parties, scrutiny of the trial conduct, trial registration, and reporting and publication of the results. Conclusion Nurse-led trials of medical devices are demanding but rewarding research enterprises. As nursing practice and research increasingly embrace technical interventions, it is vital that nurse researchers contemplating such trials understand and implement the principles of Good Clinical Practice to protect both study participants and the research team.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
There has been a rapid escalation in the development and evaluation of social and emotional well-being (SEW) programs in primary schools over the last few decades. Despite the plethora of programs available, primary teachers’ use of SEW programs is not well documented in Australian schools, with even less consideration of the factors influencing program use. A cross-sectional survey was undertaken with primary classroom teachers across twelve schools in the Brisbane and Sunshine Coast Education Districts in Queensland, Australia, during 2005. A checklist of SEW programs and an audit of SEW practices in schools were employed to investigate the number, range and types of SEW programs used by primary classroom teachers and the contextual factors influencing program use. Whilst the majority of implementation studies have been conducted under intervention conditions, this study was designed to capture primary classroom teachers’ day-to-day use of SEW programs and the factors influencing program use under real-world conditions. The findings of this research indicate that almost three quarters of the primary classroom teachers involved in the study reported using at least one SEW program during 2005. Wide variation in the number and range of programs used was evident, suggesting that teachers are autonomous in their use of SEW programs. Evidence-based SEW programs were used by a similar proportion of teachers to non-evidence-based programs. However, irrespective of the type of program used, primary teachers overwhelmingly reported using part of a SEW program rather than the whole program. This raises some issues about the quality of teachers’ program implementation in real-world practice, especially with respect to programs that are evidence-based. A content analysis revealed that a wide range of factors have been examined as potential influences on teachers’ implementation of health promotion programs in schools, including SEW programs, despite the limited number of studies undertaken to date. However, variation in the factors examined and study designs employed both within and across health promotion fields limited the extent to which studies could be compared. A methodological and statistical review also revealed substantial variation in the quality of reporting of studies. A variety of factors were examined as potential influences on primary classroom teachers’ use of SEW programs across multiple social-ecological levels of influence (ranging from community to school and individual levels). In this study, parent or caregiver involvement in class activities and the availability of wellbeing-related policies in primary schools were found to be influential in primary classroom teachers’ use of SEW programs. Teachers who often or always involve parents or caregivers in class activities were at a higher odds of program use relative to teachers who never or rarely involved parents or caregivers in class activities. However, teachers employed in schools with the highest number of wellbeing-related policies available were at a lower odds of program use relative to teachers employed in schools with fewer wellbeing-related policies available. Future research should investigate primary classroom teachers’ autonomy and motivations for using SEW programs and the reasons behind the selection and use of particular types of programs. A larger emphasis should also be placed upon teachers not using SEW programs to identify valid reasons for non-use. This would provide another step towards bridging the gap between the expectations of program developers and the needs of teachers who implement programs in practice. Additionally, the availability of wellbeing-related school policies and the types of activities that parents and caregivers are involved with in the classroom warrant more in-depth investigation. This will help to ascertain how and why these factors influence primary classroom teachers’ use of SEW programs on a day-to-day basis in schools.
Resumo:
The current discourse surrounding victims of online fraud is heavily premised on an individual notion of greed. The strength of this discourse permeates the thinking of those who have not experienced this type of crime, as well as victims themselves. The current discourse also manifests itself in theories of victim precipitation, which again assigns the locus of blame to individuals for their actions in an offence. While these typologies and categorisations of victims have been critiqued as “victim blaming” in other fields, this has not occurred with regard to online fraud victims, where victim focused ideas of responsibility for the offence continue to dominate. This paper illustrates the nature and extent of the greed discourse and argues that it forms part of a wider construction of online fraud that sees responsibility for victimisation lie with the victims themselves and their actions. It argues that the current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime. It concludes by advocating the need to further examine and challenge this discourse, especially with regard to its potential impact for victim’s access to support services and the wider criminal justice system.
Resumo:
In this letter the core-core-valence Auger transitions of an atomic impurity, both in bulk or adsorbed on a jellium-like surface, are computed within a DFT framework. The Auger rates calculated by the Fermi golden rule are compared with those determined by an approximate and simpler expression. This is based on the local density of states (LDOS) with a core hole present, in a region around the impurity nucleus. Different atoms, Na and Mg, solids, Al and Ag, and several impurity locations are considered. We obtain an excellent agreement between KL1V and KL23V rates worked out with the two approaches. The radius of the sphere in which we calculate the LDOS is the relevant parameter of the simpler approach. Its value only depends on the atomic species regardless of the location of the impurity and the type of substrate. (C) 2003 Elsevier B.V. All rights reserved.
Resumo:
Critical literacy (CL) has been the subject of much debate in the Australian public and education arenas since 2002. Recently, this debate has dissipated as literacy education agendas and attendant policies shift to embrace more hybrid models and approaches to the teaching of senior English. This paper/presentation reports on the views expressed by four teachers of senior English about critical literacy and it’s relevance to students who are from culturally and linguistically diverse backgrounds who are learning English while undertaking senior studies in high school. Teachers’ understandings of critical literacy are important, esp. given the emphasis on Critical and Creative Thinking and Literacy as two of the General Capabilities underpinning the Australian national curriculum. Using critical discourse analysis, data from four specialist ESL teachers in two different schools were analysed for the ways in which these teachers construct critical literacy. While all four teachers indicated significant commitment to critical literacy as an approach to English language teaching, the understandings they articulated varied from providing forms of access to powerful genres, to rationalist approaches to interrogating text, to a type of ‘critical-aesthetic’ analysis of text construction. Implications are also discussed.
Resumo:
Vaccination campaigns to prevent the spread of epidemics are successful only if the targeted populations subscribe to the recommendations of health authorities. However, because compulsory vaccination is hardly conceivable in modern democracies, governments need to convince their populations through efficient and persuasive information campaigns. In the context of the swine-origin A (H1N1) 2009 pandemic, we use an interactive study among the general public in the South of France, with 175 participants, to explore what type of information can induce change in vaccination intentions at both aggregate and individual levels. We find that individual attitudes to vaccination are based on rational appraisal of the situation, and that it is information of a purely scientific nature that has the only significant positive effect on intention to vaccinate.
Resumo:
Monitoring and estimation of marine populations is of paramount importance for the conservation and management of sea species. Regular surveys are used to this purpose followed often by a manual counting process. This paper proposes an algorithm for automatic detection of dugongs from imagery taken in aerial surveys. Our algorithm exploits the fact that dugongs are rare in most images, therefore we determine regions of interest partially based on color rarity. This simple observation makes the system robust to changes in illumination. We also show that by applying the extended-maxima transform on red-ratio images, submerged dugongs with very fuzzy edges can be detected. Performance figures obtained here are promising in terms of degree of confidence in the detection of marine species, but more importantly our approach represents a significant step in automating this type of surveys.