207 resultados para Material intensity
Resumo:
Light Detection and Ranging (LIDAR) has great potential to assist vegetation management in power line corridors by providing more accurate geometric information of the power line assets and vegetation along the corridors. However, the development of algorithms for the automatic processing of LIDAR point cloud data, in particular for feature extraction and classification of raw point cloud data, is in still in its infancy. In this paper, we take advantage of LIDAR intensity and try to classify ground and non-ground points by statistically analyzing the skewness and kurtosis of the intensity data. Moreover, the Hough transform is employed to detected power lines from the filtered object points. The experimental results show the effectiveness of our methods and indicate that better results were obtained by using LIDAR intensity data than elevation data.
Resumo:
Many interesting phenomena have been observed in layers of granular materials subjected to vertical oscillations; these include the formation of a variety of standing wave patterns, and the occurrence of isolated features called oscillons, which alternately form conical heaps and craters oscillating at one-half of the forcing frequency. No continuum-based explanation of these phenomena has previously been proposed. We apply a continuum theory, termed the double-shearing theory, which has had success in analyzing various problems in the flow of granular materials, to the problem of a layer of granular material on a vertically vibrating rigid base undergoing vertical oscillations in plane strain. There exists a trivial solution in which the layer moves as a rigid body. By investigating linear perturbations of this solution, we find that at certain amplitudes and frequencies this trivial solution can bifurcate. The time dependence of the perturbed solution is governed by Mathieu’s equation, which allows stable, unstable and periodic solutions, and the observed period-doubling behaviour. Several solutions for the spatial velocity distribution are obtained; these include one in which the surface undergoes vertical velocities that have sinusoidal dependence on the horizontal space dimension, which corresponds to the formation of striped standing waves, and is one of the observed patterns. An alternative continuum theory of granular material mechanics, in which the principal axes of stress and rate-of-deformation are coincident, is shown to be incapable of giving rise to similar instabilities.
Resumo:
In the 1930s and 1940s, Australian women writers published novels, poems, and short stories that pushed the boundaries of their national literary culture. From their position in the Pacific, they entered into a dialogue with a European modernism that they reworked to invigorate their own writing and to make cross-continental connections. My interest in the work of Australian women prose writers of this period stems from an appreciation of the extent of their engagement with interwar modernism (an engagement that is generally under-acknowledged) and the realization that there are commonalities of approach with the ways in which contemporaneous Chinese authors negotiated this transnational cultural traffic. China and Australia, it has been argued, share an imaginative and literal association of many centuries, and this psychic history produces a situation in which ‘Australians feel drawn towards China: they cannot leave it alone.’1 Equally, Chinese exploration of the great southern land began in the fifteenth century, prior to European contact. In recent times, the intensity of Australia’s cultural and commercial connections with Asia has led to a repositioning of the Australian sense of regionalism in general and, in particular, has activated yet another stage in the history of its relationship with China. In this context, the association of Australian and Chinese writing is instructive because the commonalities of approach and areas of interest between certain authors indicate that Australian writers were not alone in either the content or style of their response to European modernism. This recognition, in turn, advances discussions of modernism in Australia and reveals an alternative way of looking at the world from the Pacific Rim through literature. The intent is to examine selective Australian and Chinese authors who are part of this continuous history and whose writing demonstrates common thematic and stylistic features via the vector of modernism. I focus on the 1930s and 1940s because these are the decades in which Australia and China experienced wideranging conflict in the Pacific, and it is significant that war, both forthcoming and actual, features as an ominous soundtrack in the writing of Chinese and Australian women. I argue that, given the immensity of cultural difference between Australia and China, there is an especially interesting juncture in the ways in which the authors interrogate modernist practices and the challenge of modernism. The process in which writing from the Pacific Rim jointly negotiates the twin desires of engaging with European literary form and representing one’s own culture may be seen as what Jessica Berman identifies as a geomodernism, one of the ‘new possible geographies’ of modernism.2 My discussion centres on the work of the Australian women, to which the Chinese material serves as a point of reference, albeit a critical one. The Chinese writing examined here is restricted to authors who wrote at least some material in English and whose work is available in translation.
Resumo:
This research explores the empirical association between takeover bid premium and acquired (purchased) goodwill, and tests whether the strength of the association changes after the passage of approved accounting standard AASB 1013 in Australia in 1988. AASB 1013 mandated capitalization and amortization of acquired goodwill to the income statement over a maximum period of 20 years. We use regressions to assess how the association between bid premium and acquired goodwill varies in the pre-AASB and post-AASB 1013 periods after controlling for confounding factors. Our results show that reducing the variety of accounting policy options available to bidder management after an acquisition results in a systematic reduction in the strength of the association between premium and goodwill.
Resumo:
A mathematical model is developed to simulate the discharge of a LiFePO4 cathode. This model contains 3 size scales, which match with experimental observations present in the literature on the multi-scale nature of LiFePO4 material. A shrinking-core is used on the smallest scale to represent the phase-transition of LiFePO4 during discharge. The model is then validated against existing experimental data and this validated model is then used to investigate parameters that influence active material utilisation. Specifically the size and composition of agglomerates of LiFePO4 crystals is discussed, and we investigate and quantify the relative effects that the ionic and electronic conductivities within the oxide have on oxide utilisation. We find that agglomerates of crystals can be tolerated under low discharge rates. The role of the electrolyte in limiting (cathodic) discharge is also discussed, and we show that electrolyte transport does limit performance at high discharge rates, confirming the conclusions of recent literature.
Resumo:
PURPOSE: To determine the effect of acute bouts of moderate- and high-intensity walking exercise on non-exercise activity thermogenesis (NEAT) in overweight and obese adults. ---------- METHOD: 16 participants performed a single bout of either moderate-intensity walking exercise (MIE) or high-intensity walking exercise (HIE) on two separate occasions. The MIE consisted of walking for 60 minutes on a motorized treadmill at 6 km.h. The 60-minute HIE session consisted of walking in 5-min intervals at 6 km.h and 10% grade followed by 5-min at 0% grade. NEAT was assessed by accelerometer on three days before, the day of, and three days following the exercise sessions. ---------- RESULTS: There was no significant difference in NEAT vector magnitude (counts.min) between the pre-exercise period (days 1-3) and the exercise day (day 4) for either MIE or HIE protocol. In addition, there was no change in NEAT during the three days following the MIE session, however NEAT increased by 16% on day 7 (post-exercise) compared with exercise day (P = 0.32). However during the post-exercise period following the HIE session, NEAT was increased by 25% on day 7 compared with the exercise day (P = 0.08), and by 30-33% compared with pre-exercise period (day 1, day 2 and day 3); P = 0.03, 0.03, 0.02, respectively. ---------- CONCLUSION: A single bout of either MIE or HIE did not alter NEAT on the exercise day or on the first two days following the exercise session. However, monitoring NEAT on a third day allowed the detection of a 48-h delay in increased NEAT after performing HIE. A longer-term intervention is needed to determine the effect of accumulated exercise sessions over a week on NEAT.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.