55 resultados para Side collisions.
Resumo:
Numerically investigation of natural convection within a differentially heated modified square enclosure with sinusoidally corrugated side walls has been performed for different values of Rayleigh number. The fluid inside the enclosure considered is air and is quiescent, initially. The top and bottom surfaces are flat and considered as adiabatic. Results reveal three main stages: an initial stage, a transitory or oscillatory stage and a steady stage for the development of natural convection flow inside the corrugated cavity. The numerical scheme is based on the finite element method adapted to triangular non-uniform mesh element by a non-linear parametric solution algorithm. Investigation has been performed for the Rayleigh number, Ra ranging from 105 to 108 with variation of corrugation amplitude and frequency. Constant physical properties for the fluid medium have been assumed. Results have been presented in terms of the isotherms, streamlines, temperature plots, average Nusselt numbers, traveling waves and thermal boundary layer thickness plots, temperature and velocity profiles. The effects of sudden differential heating and its consequent transient behavior on fluid flow and heat transfer characteristics have been observed for the range of governing parameters. The present results show that the transient phenomena are greatly influenced by the variation of the Rayleigh Number with corrugation amplitude and frequency.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from our team of international Entrepreneurhsip researchers. In this vignette, Dr Rene Bakker explores "the dark side" of entrepreneurship.
Resumo:
The growing demand of air-conditioning is one of the largest contributors to Australia’s overall electricity consumption. This has started to create peak load supply problems for some electricity utilities particularly in Queensland. This research aimed to develop consumer demand side response model to assist electricity consumers to mitigate peak demand on the electrical network. The model developed demand side response model to allow consumers to manage and control air conditioning for every period, it is called intelligent control. This research investigates optimal response of end-user toward electricity price for several cases in the near future, such as: no spike, spike and probability spike price cases. The results indicate the potential of the scheme to achieve energy savings, reducing electricity bills (costs) to the consumer and targeting best economic performance for electrical generation distribution and transmission.
Resumo:
Purpose Exercise for Health was a randomized, controlled trial designed to evaluate two modes of delivering (face-to-face [FtF] and over-the-telephone [Tel]) an 8-month translational exercise intervention, commencing 6-weeks post-breast cancer surgery (PS). Methods Outcomes included quality of life (QoL), function (fitness and upper-body) and treatment-related side effects (fatigue, lymphoedema, body mass index, menopausal symptoms, anxiety, depression and pain). Generalised estimating equation modelling determined time (baseline [5-weeks PS], mid-intervention [6-months PS], post-intervention [12-months PS]), group (FtF, Tel, Usual Care [UC]) and time-by-group effects. 194 women representative of the breast cancer population were randomised to the FtF (n=67), Tel (n=67) and UC (n=60) groups. Results: There were significant (p<0.05) interaction effects on QoL, fitness and fatigue, with differences being observed between the treatment groups and the UC group. Trends observed for the treatment groups were similar. The treatment groups reported improved QoL, fitness and fatigue over time and changes observed between baseline and post-intervention were clinically relevant. In contrast, the UC group experienced no change, or worsening QoL, fitness and fatigue, mid-intervention. Although improvements in the UC group occurred by 12-months post-surgery, the change did not meet the clinically relevant threshold. There were no differences in other treatment-related side-effects between groups. Conclusion This translational intervention trial, delivered either face-to-face or over-the-telephone, supports exercise as a form of adjuvant breast cancer therapy that can prevent declines in fitness and function during treatment and optimise recovery post-treatment.
The backfilled GEI : a cross-capture modality gait feature for frontal and side-view gait recognition
Resumo:
In this paper, we propose a novel direction for gait recognition research by proposing a new capture-modality independent, appearance-based feature which we call the Back-filled Gait Energy Image (BGEI). It can can be constructed from both frontal depth images, as well as the more commonly used side-view silhouettes, allowing the feature to be applied across these two differing capturing systems using the same enrolled database. To evaluate this new feature, a frontally captured depth-based gait dataset was created containing 37 unique subjects, a subset of which also contained sequences captured from the side. The results demonstrate that the BGEI can effectively be used to identify subjects through their gait across these two differing input devices, achieving rank-1 match rate of 100%, in our experiments. We also compare the BGEI against the GEI and GEV in their respective domains, using the CASIA dataset and our depth dataset, showing that it compares favourably against them. The experiments conducted were performed using a sparse representation based classifier with a locally discriminating input feature space, which show significant improvement in performance over other classifiers used in gait recognition literature, achieving state of the art results with the GEI on the CASIA dataset.
Resumo:
In the last decade community living, in master planned communities or strata titled complexes, has increased. As land becomes scarcer, the popularity of these schemes is predicted to grow. Offsetting this popularity is the peculiarities of community living, in particular the often unthought-of difficulties arising from living in very close proximity to your neighbour. Such difficulties affect both amenity of life and property value. This paper seeks to inform practitioners of the issues arising from community living. It does this by identifying the more common forms of disputes and considering recent tribunal and court decisions. The paper concludes by identifying the dispute warning signs to assist to practitioners with the valuation process.
Resumo:
A 1500-word review of Strindberg: A Life by Sue Prideaux (Yale UP, 2012). One way of classifying biographies is to divide them into those that apply their own interpretative framework – be it psychoanalytic, gender-based, socio-historical, and so on – to a given subject and those that aim to meet the subject, on their own terms, or at least in terms that the subject would recognise...
Resumo:
A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Previous research into the potential ‘dark’ side of trait emotional intelligence (EI) has repeatedly demonstrated that trait EI is negatively associated with Machiavellianism. In this study, we reassess the potential dark side of trait EI, by testing whether Agreeableness mediates and/or moderates the relationship between trait EI and Machiavellianism. Hypothesized mediation and moderation effects were tested using a large sample of 884 workers who completed several self-report questionnaires. Results provide support for both hypotheses; Agreeableness was found to mediate and moderate the relationship between trait EI and Machiavellianism. Overall, results indicate that individuals high in trait EI tend to have low levels of Machiavellianism because they generally have a positive nature (i.e. are agreeable) and not because they are emotionally competent per se. Results also indicate that individuals high in ‘perceived emotional competence’ have the potential to be high in Machiavellianism, particularly when they are low in Agreeableness.
Resumo:
Collisions between distinct road users (e.g. drivers and riders, drivers and cyclists) make a substantial contribution to the road trauma burden. Although evidence suggests different road users interpret the same road situations contrarily, it is not clear how their situation awareness differs, nor is it clear which differences might lead to conflicts. This article presents the findings from an on-road study which was conducted to examine driver, cyclist and motorcyclist situation awareness in different road environments. The findings suggest that drivers, motorcyclists, and cyclists develop markedly different situational understandings even when operating in the same road environments. Examination of these differences indicate that they are likely to be compatible along arterial roads, shopping strips and at roundabouts, but that they may create conflicts between the different road users at intersections. The key role of road design in supporting compatible situation awareness and behaviour across different road users is discussed.