457 resultados para strong-field
Resumo:
Traffic safety culture is a relatively new concept which has recently gained attention in the field of traffic safety. There is currently little known regarding the nature of the concept, nor how it should be defined. Preliminary definitions have tended to focus on specific road safety problems and the anticipated effect of a strong traffic safety culture. The literature to date has tended to emphasise how traffic safety culture might be created or shaped. However, without a better understanding of the nature and structure of traffic safety culture, discussions regarding changes to traffic safety culture are restricted. An examination of different conceptualisations and definitions of organisational safety culture provides a preliminary theoretical framework for traffic safety culture. Two high risk driving behaviours within the Australian context are compared to illustrate how key factors within this framework can be used to understand and improve road safety outcomes.
Resumo:
Stereotactic radiosurgery treatments involve the delivery of very high doses for a small number of fractions. To date, there is limited data in terms of the skin dose for the very small field sizes used in these treatments. In this work, we determine relative surface doses for small size circular collimators as used in stereotactic radiosurgery treatments. Monte Carlo calculations were performed using the BEAMnrc code with a model of the Novalis 15 Trilogy linear accelerator and the BrainLab circular collimators. The surface doses were calculated at the ICRU skin dose depth of 70 m all using the 6 MV SRS x-ray beam. The calculated surface doses varied between 15 – 12% with decreasing values as the field size increased from 4 to 30 mm. In comparison, surface doses were measured using Gafchromic EBT3 film positioned at the surface of a Virtual Water phantom. The absolute agreement between calculated and measured surface doses was better than 2.5% which is well within the 20 uncertainties of the Monte Carlo calculations and the film measurements. Based on these results, we have shown that the Gafchromic EBT3 film is suitable for surface dose estimates in very small size fields as used in SRS.
Resumo:
To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
This paper reviews a wide range of literature on environmental management in the field in Queensland, and analyzes this by period and by author. An episodic pattern of activities since European settlement is evident. Periods of exploration (pre-1950) and inventory- compilation (ca. 1950-1970) were followed by two decades of media and non-government organization campaigning (ca. 1970-1990), then an era dominated by government regulatory action (ca. 1990-2010). These eras dominated public perception of what was happening in environmental practice. They were delineated by historic ‘interventions’ (summarily, the end of World War II, the 1971 inflationary crisis, and computerization respectively).
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
The writing of award winning tartan noir author, Denise Mina, “crime queen of Glasgow” has been identified with “explicitly feminist politics,” and Mina herself claims, as a feminist, she wants to use crime fiction to present a “narrative about very disempowered people becoming empowered.” This paper explores how Mina’s avowed stance on feminism plays out in her novel, The Field of Blood (2005), and examines whether her concerns are reflected in the embodied actions of her young protagonist, would-be investigative journalist, Paddy Meehan. It asks whether Mina has succeeded in working against entrenched patriarchal codes of crime fiction’s dominant narrative construction or whether her feminist intentions have been undermined by traditional stereotypical conventions of the genre.
Resumo:
"This invaluable companion to The Mammals of Australia is intended to be taken out into the field and used in conjunction with the more comprehensive volume. Genuinely practical in the outdoors, the book includes accounts of 389 species and newly developed, comprehensive identification keys. The Field Companion is introduced by a Mammal Distribution Matrix, which provides a classified checklist of all mammals in Australia (including those extinguished since European settlement) and the distribution of extant species in each state and territory. Species accounts provide initial differentiation, and include notes on identification, size, abundance, habitat and federal list/status, photograph and distribution map, as well as key references, which provide quick access to all relevant state identification keys in the Field Companion and to the longer entry in The Mammals of Australia. The authors have developed separate keys, illustrated with detailed drawings and maps, for the six states and the Northern Territory, to simplify the identification process and allow the reader to confidently separate all mammal species, no matter how subtle the differences. With the addition of these identification keys, this book becomes more than a field guide - although it is intended primarily to be used outdoors - and allows the user to finish identification based on more obscure characteristics, which is an advantage for some hard-to-identify species groups."--Libraries Australia
Resumo:
In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.
Resumo:
Measurement of the moisture variation in soils is required for geotechnical design and research because soil properties and behavior can vary as moisture content changes. The neutron probe, which was developed more than 40 years ago, is commonly used to monitor soil moisture variation in the field. This study reports a full-scale field monitoring of soil moisture using a neutron moisture probe for a period of more than 2 years in the Melbourne (Australia) region. On the basis of soil types available in the Melbourne region, 23 sites were chosen for moisture monitoring down to a depth of 1500 mm. The field calibration method was used to develop correlations relating the volumetric moisture content and neutron counts. Observed results showed that the deepest “wetting front” during the wet season was limited to the top 800 to 1000 mm of soil whilst the top soil layer down to about 550mmresponded almost immediately to the rainfall events. At greater depths (550 to 800mmand below 800 mm), the moisture variations were relatively low and displayed predominantly periodic fluctuations. This periodic nature was captured with Fourier analysis to develop a cyclic moisture model on the basis of an analytical solution of a one-dimensional moisture flow equation for homogeneous soils. It is argued that the model developed can be used to predict the soil moisture variations as applicable to buried structures such as pipes.
Resumo:
We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.
Resumo:
A physical and numerical steady flow impinging jet has been used to simulate the bulk characteristics of a downburst-like wind field. The influence of downdraft tilt and surface roughness on the ensuing wall jet flow has been investigated. It was found that a simulated downdraft impinging the surface at a non-normal angle has the potential for causing larger structural loads than the normal impingement case. It was also found that for the current impinging jet simulations, surface roughness played a minor role in determining the storm maximum wind structure, but this influence increased as the wall jet diverged. However, through comparison with previous research it was found that the influence of surface roughness is Reynolds number dependent and therefore may differ from that reported herein for full-scale downburst cases. Using the current experimental results an empirical model has been developed for laboratory-scale impinging jet velocity structure that includes the influence of both jet tilt and surface roughness.
Resumo:
A pulsed wall jet has been used to simulate the gust front of a thunderstorm downburst. Flow visualization, wind speed and surface pressure measurements were obtained. The characteristics of the hypothesized ring vortex of a full-scale downburst were reproduced at a scale estimated to be 1:3000.