198 resultados para 60´s generation
Resumo:
In place of, or alongside paradigms such as "the net generation", we suggest that the full implications of the Internet might be productively analysed using a broader framework, that of social imaginaries. First used by Cornelius Castoriadis and more recently by Charles Taylor, the social imaginary, as applied here, is the loosely co-ordinated body of significations that enable our social acts and practices by making sense of them.
Resumo:
Focuses on a study which introduced an iterative modeling method that combines properties of ordinary least squares (OLS) with hierarchical tree-based regression (HTBR) in transportation engineering. Information on OLS and HTBR; Comparison and contrasts of OLS and HTBR; Conclusions.
Resumo:
Improving efficiency and flexibility in pulsed power supply technologies are the most substantial concerns of pulsed power systems specifically for plasma generation. Recently, the improvement of pulsed power supply becomes of greater concern due to extension of pulsed power applications to environmental and industrial areas. A current source based topology is proposed in this paper which gives the possibility of power flow control. The main contribution in this configuration is utilization of low-medium voltage semiconductor switches for high voltage generation. A number of switch-diode-capacitor units are designated at the output of topology to exchange the current source energy into voltage form and generate a pulsed power with sufficient voltage magnitude and stress. Simulations have been carried out in Matlab/SIMULINK platform to verify the capability of this topology in performing desired duties. Being efficient and flexible are the main advantages of this topology.
Resumo:
This research discusses some of the issues encountered while developing a set of WGEN parameters for Chile and advice for others interested in developing WGEN parameters for arid climates. The WGEN program is a commonly used and a valuable research tool; however, it has specific limitations in arid climates that need careful consideration. These limitations are analysed in the context of generating a set of WGEN parameters for Chile. Fourteen to 26 years of precipitation data are used to calculate precipitation parameters for 18 locations in Chile, and 3–8 years of temperature and solar radiation data are analysed to generate parameters for seven of these locations. Results indicate that weather generation parameters in arid regions are sensitive to erroneous or missing precipitation data. Research shows that the WGEN-estimated gamma distribution shape parameter (α) for daily precipitation in arid zones will tend to cluster around discrete values of 0 or 1, masking the high sensitivity of these parameters to additional data. Rather than focus on the length in years when assessing the adequacy of a data record for estimation of precipitation parameters, researchers should focus on the number of wet days in dry months in a data set. Analysis of the WGEN routines for the estimation of temperature and solar radiation parameters indicates that errors can occur when individual ‘months’ have fewer than two wet days in the data set. Recommendations are provided to improve methods for estimation of WGEN parameters in arid climates.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.
Resumo:
In rural low-voltage networks, distribution lines are usually highly resistive. When many distributed generators are connected to such lines, power sharing among them is difficult when using conventional droop control, as the real and reactive power have strong coupling with each other. A high droop gain can alleviate this problem but may lead the system to instability. To overcome4 this, two droop control methods are proposed for accurate load sharing with frequency droop controller. The first method considers no communication among the distributed generators and regulates the output voltage and frequency, ensuring acceptable load sharing. The droop equations are modified with a transformation matrix based on the line R/X ration for this purpose. The second proposed method, with minimal low bandwidth communication, modifies the reference frequency of the distributed generators based on the active and reactive power flow in the lines connected to the points of common coupling. The performance of these two proposed controllers is compared with that of a controller, which includes an expensive high bandwidth communication system through time-domain simulation of a test system. The magnitude of errors in power sharing between these three droop control schemes are evaluated and tabulated.
Resumo:
Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.
Resumo:
This paper presents a Genetic Algorithms (GA) approach to resolve traffic conflicts at a railway junction. The formulation of the problem for the suitable application of GA will be discussed and three neighborhoods have been proposed for generation evolution. The performance of the GA is evaluated by computer simulation. This study paves the way for more applications of artificial intelligence techniques on a rather conservative industry.
Resumo:
Voluminous (≥3·9 × 105 km3), prolonged (∼18 Myr) explosive silicic volcanism makes the mid-Tertiary Sierra Madre Occidental province of Mexico one of the largest intact silicic volcanic provinces known. Previous models have proposed an assimilation–fractional crystallization origin for the rhyolites involving closed-system fractional crystallization from crustally contaminated andesitic parental magmas, with <20% crustal contributions. The lack of isotopic variation among the lower crustal xenoliths inferred to represent the crustal contaminants and coeval Sierra Madre Occidental rhyolite and basaltic andesite to andesite volcanic rocks has constrained interpretations for larger crustal contributions. Here, we use zircon age populations as probes to assess crustal involvement in Sierra Madre Occidental silicic magmatism. Laser ablation-inductively coupled plasma-mass spectrometry analyses of zircons from rhyolitic ignimbrites from the northeastern and southwestern sectors of the province yield U–Pb ages that show significant age discrepancies of 1–4 Myr compared with previously determined K/Ar and 40Ar/39Ar ages from the same ignimbrites; the age differences are greater than the errors attributable to analytical uncertainty. Zircon xenocrysts with new overgrowths in the Late Eocene to earliest Oligocene rhyolite ignimbrites from the northeastern sector provide direct evidence for some involvement of Proterozoic crustal materials, and, potentially more importantly, the derivation of zircon from Mesozoic and Eocene age, isotopically primitive, subduction-related igneous basement. The youngest rhyolitic ignimbrites from the southwestern sector show even stronger evidence for inheritance in the age spectra, but lack old inherited zircon (i.e. Eocene or older). Instead, these Early Miocene ignimbrites are dominated by antecrystic zircons, representing >33 to ∼100% of the dated population; most antecrysts range in age between ∼20 and 32 Ma. A sub-population of the antecrystic zircons is chemically distinct in terms of their high U (>1000 ppm to 1·3 wt %) and heavy REE contents; these are not present in the Oligocene ignimbrites in the northeastern sector of the Sierra Madre Occidental. The combination of antecryst zircon U–Pb ages and chemistry suggests that much of the zircon in the youngest rhyolites was derived by remelting of partially molten to solidified igneous rocks formed during preceding phases of Sierra Madre Occidental volcanism. Strong Zr undersaturation, and estimations for very rapid dissolution rates of entrained zircons, preclude coeval mafic magmas being parental to the rhyolite magmas by a process of lower crustal assimilation followed by closed-system crystal fractionation as interpreted in previous studies of the Sierra Madre Occidental rhyolites. Mafic magmas were more probably important in providing a long-lived heat and material flux into the crust, resulting in the remelting and recycling of older crust and newly formed igneous materials related to Sierra Madre Occidental magmatism.
Resumo:
This chapter explores a research project involving teachers working with some of the most disadvantaged young people in South Australia, children growing up in poverty, in families struggling with homelessness and ill-health, in the outer southern suburbs. Additionally, there were particular children were struggling with intellectual, emotional and social difficulties which were extreme enough for them not be included in a mainstream class. The research project made two crucial interrelated moves to support teachers to tackle this tough work. First, the project had an explicit social justice agenda. We were not simply researching literacy outcomes, but literacy pedagogies for the students teachers were most worried about. And we wanted to understand how the material conditions of students’ everyday lifeworlds impacted on the working conditions of teachers’ schoolworlds. We sought to open up a discursive space where teachers could talk about poverty, violence, racism and classism in ways that would take them beyond despair and into new imaginings and positive action. Second, the project was designed to start from the urgent questions of early career teachers and to draw on the accumulated practice wisdom of their chosen mentors. Hence we designed not only a teacher-researcher community, but cross-generational networks. Our aim was to build the capacities of both generations to address long-standing educational problems in new ways that drew overtly on their different and complementary resources.
Resumo:
Trust can be used for neighbor formation to generate automated recommendations. User assigned explicit rating data can be used for this purpose. However, the explicit rating data is not always available. In this paper we present a new method of generating trust network based on user’s interest similarity. To identify the interest similarity, we use user’s personalized tag information. This trust network can be used to find the neighbors to make automated recommendation. Our experiment result shows that the precision of the proposed method outperforms the traditional collaborative filtering approach.