385 resultados para Special Protection Area
Resumo:
This paper proposes a new method for stabilizing disturbed power systems using wide area measurement and FACTS devices. The approach focuses on both first swing and damping stability of power systems following large disturbances. A two step control algorithm based on Lyapunov Theorem is proposed to be applied on the controllers to improve the power systems stability. The proposed approach is simulated on two test systems and the results show significant improvement in the first swing and damping stability of the test systems.
Resumo:
This paper presents a study done into the effectiveness of using local acceleration measurements vs. remote angle measurements in providing stabilising control via SVCs following large disturbances. The system studied was an analogue of the Queensland-New South Wales Interconnection (QNI) and involved the control of an existing Static Var Compensators (SVC) at Sydney West. This study is placed in the context of wide area controls for large systems using aggregated models for groups of machines.
Resumo:
Experience gained from numerous projects conducted by the U.S. Environmental Protection Agency's (EPA) Environmental Monitoring Systems Laboratory in Las Vegas, Nevada has provided insight to functional issues of mapping, monitoring, and modeling of wetland habitats. Three case studies in poster form describe these issues pertinent to managing wetland resources as mandated under Federal laws. A multiphase project was initiated by the EPA Alaska operations office to provide detailed wetland mapping of arctic plant communities in an area under petroleum development pressure. Existing classification systems did not meet EPA needs. Therefore a Habitat Classification System (HCS) derived from aerial photography was compiled. In conjunction with this photointerpretive keys were developed. These products enable EPA personnel to map large inaccessible areas of the arctic coastal plain and evaluate the sensitivity of various wetland habitats relative to petroleum development needs.
Resumo:
Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).
Resumo:
More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.
Resumo:
In Australia, the idea of home ownership or The Great Australian Dream is still perceived as the main achievement of every Australian’s life. Perception of an ideal home is changing over the decades. Each generation has special requirements criteria which foster their dwelling space. This research identifies and compares three generations’ (Baby Boomers, Generation X and Generation Y) demographics, special requirements and perceptions regarding their ideal home. The examination of previous research and literature into the Queensland context reveals that the Baby Boomers population of people 65 and older is currently 11.8% of the state population and is expected to grow to almost one quarter of the population by 2051. This is the highest growth rate among these three generations. Further analysis of these three generations’ status and requirements shows that aging is the most critical issue for the housing systems. This is especially the case for Baby Boomers due to their demand for support services and health care in the home. The study reveals that ‘ageing in place’, is a preferred option for the aged. This raises questions as to how well the housing system and neighbourhood environments are able to support ageing in place, and what aging factors should be taken into consideration when designing Baby boomer’s home to facilitate health and wellbeing. Therefore, this research designed a qualitative approach to investigate Australian Baby Boomers homes around Queensland, predominantly in the Brisbane area, using semi-structured interviews and observations. It aims to find out the level of satisfaction of Australian Baby Boomers with their current home and their preferences and requirements in light of their ideal home. The findings contribute new knowledge in the light of ideal home mechanisms. A set of strategies has been developed from the findings that may help improve the level of comfort, safety and satisfaction that Baby Boomers experience in their current and future homes.
Resumo:
The ethical governance of biomedical research is an area of intense international debate. Scholars argue about who should regulate and how, the appropriate role for ethics committees, what kind of research should be included, and who should be involved in monitoring compliance. A particular aspect of these debates concerns the inclusion of women as research participants and the efforts to ensure that researchers consistently investigate questions of sex and gender in health research. There is increasing evidence of the role of sex in the manifestation and course of some illnesses and their treatment. Moreover, evidence suggests that gendered expectations also affect health outcomes. This special issue investigates how researchers are addressing these issues and debates the appropriate roles of policy makers, ethicists, and lawyers in ensuring that sex and gender differences are taken into account in the development, conduct, and reporting of health research.
Resumo:
The issue of how individual patients and their doctors should act in relation to the knowledge that the patient has a genetic condition— specifically, whether the patient and/or the doctor should or must inform relevant members of the patient’s family—is a looming area of medicolegal controversy. Over the last fifteen years or so, the issue of confidentiality versus disclosure has been particularly controversial in relation to HIV/AIDS patients.1 It has been argued that medical information about genetic disease gives rise to special problems vis-à-vis blood relatives. Because genetic disease is transmitted only by way of procreation, information about genetic disease is unique in that there is a propensity (which is highly variable and depends upon a variety of factors) for the condition to be shared by members of a family who are biologically related. Thus, genetic information about an individual may reveal information about relatives of that individual which is ‘specific (that the person has or will develop a genetic disease); or predictive (that the person has an unspecified risk of developing the disease)’
Resumo:
"Combining facets of health physics with medicine, An Introduction to Radiation Protection in Medicine covers the background of the subject and the medical situations where radiation is the tool to diagnose or treat human disease. Encouraging newcomers to the field to properly and efficiently function in a versatile and evolving work setting, it familiarizes them with the particular problems faced during the application of ionizing radiation in medicine. The text builds a fundamental knowledge base before providing practical descriptions of radiation safety in medicine. It covers basic issues related to radiation protection, including the physical science behind radiation protection and the radiobiological basis of radiation protection. The text also presents operational and managerial tools for organizing radiation safety in a medical workplace. Subsequent chapters form the core of the book, focusing on the practice of radiation protection in different medical disciplines. They explore a range of individual uses of ionizing radiation in various branches of medicine, including radiology, nuclear medicine, external beam radiotherapy, and brachytherapy. With contributions from experienced practicing physicists, this book provides essential information about dealing with radiation safety in the rapidly shifting and diverse environment of medicine."--publisher website
Resumo:
Balancing the competing interests of autonomy and protection of individuals is an escalating challenge confronting an ageing Australian population. Legal and medical professionals are increasingly being asked to determine whether individuals are legally capable to make their own testamentary, financial and/or personal/health care decisions. Diseases such as dementia impact upon cognition which necessitates collaboration between the legal and medical professions to satisfactorily assess the effect of such mentally disabling conditions upon legal competency. Terminological and methodological differences exist between the two professions when assessing capacity in this context which subsequently create miscommunication and misunderstanding. Consequently, it is not necessarily a simple solution for a legal professional to seek the opinion of a medical practitioner. Exacerbating the situation is the fact that no consistent and transparent capacity assessment paradigm currently exists in Australia. Assessments are instead being undertaken on an ad hoc basis dependent upon the skill set of the legal and/or medical professionals involved. A qualitative study seeking the views of legal and medical professionals who practise in this area has been conducted. This incorporated a review of the relevant literature and surveys which informed the semi-structured interviews conducted with 10 legal and 20 medical practitioners. Practitioners were asked whether there is a standard approach to assessment and whether national guidelines would assist. The general consensus was that uniform guidelines would be advantageous. The research also canvassed practitioner views as to the state of the relationship between the professions when assessing capacity. Three promising practices have emerged from this research: first, is the need for the development of national guidelines and supporting principles to satisfactorily assess capacity; second, is the possibility of strengthening the relationship between legal and medical professionals to assist in the satisfactory assessment of legal capacity; and third, the need for increased community education.
Resumo:
Background Heatwaves could cause the population excess death numbers to be ranged from tens to thousands within a couple of weeks in a local area. An excess mortality due to a special event (e.g., a heatwave or an epidemic outbreak) is estimated by subtracting the mortality figure under ‘normal’ conditions from the historical daily mortality records. The calculation of the excess mortality is a scientific challenge because of the stochastic temporal pattern of the daily mortality data which is characterised by (a) the long-term changing mean levels (i.e., non-stationarity); (b) the non-linear temperature-mortality association. The Hilbert-Huang Transform (HHT) algorithm is a novel method originally developed for analysing the non-linear and non-stationary time series data in the field of signal processing, however, it has not been applied in public health research. This paper aimed to demonstrate the applicability and strength of the HHT algorithm in analysing health data. Methods Special R functions were developed to implement the HHT algorithm to decompose the daily mortality time series into trend and non-trend components in terms of the underlying physical mechanism. The excess mortality is calculated directly from the resulting non-trend component series. Results The Brisbane (Queensland, Australia) and the Chicago (United States) daily mortality time series data were utilized for calculating the excess mortality associated with heatwaves. The HHT algorithm estimated 62 excess deaths related to the February 2004 Brisbane heatwave. To calculate the excess mortality associated with the July 1995 Chicago heatwave, the HHT algorithm needed to handle the mode mixing issue. The HHT algorithm estimated 510 excess deaths for the 1995 Chicago heatwave event. To exemplify potential applications, the HHT decomposition results were used as the input data for a subsequent regression analysis, using the Brisbane data, to investigate the association between excess mortality and different risk factors. Conclusions The HHT algorithm is a novel and powerful analytical tool in time series data analysis. It has a real potential to have a wide range of applications in public health research because of its ability to decompose a nonlinear and non-stationary time series into trend and non-trend components consistently and efficiently.