166 resultados para Pellegrini, Pellegrino, called Tibaldi, b.1527.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated visual surveillance of crowds is a rapidly growing area of research. In this paper we focus on motion representation for the purpose of abnormality detection in crowded scenes. We propose a novel visual representation called textures of optical flow. The proposed representation measures the uniformity of a flow field in order to detect anomalous objects such as bicycles, vehicles and skateboarders; and can be combined with spatial information to detect other forms of abnormality. We demonstrate that the proposed approach outperforms state-of-the-art anomaly detection algorithms on a large, publicly-available dataset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In asset intensive industries such as mining, oil & gas, utilities etc. most of the capital expenditure happens on acquiring engineering assets. Process of acquiring assets is called as “Procurement” or “Acquisition”. An asset procurement decision should be taken in consideration with the installation, commissioning, operational, maintenance and disposal needs of an asset or spare. However, such cross-functional collaboration and communication does not appear to happen between engineering, maintenance, warehousing and procurement functions in many asset intensive industries. Acquisition planning and execution are two distinct parts of asset acquisition process. Acquisition planning or procurement planning is responsible for determining exactly what is required to be purchased. It is important that an asset acquisition decision is the result of cross-functional decision making process. An acquisition decision leads to a formal purchase order. Most costly asset decisions occur even before they are acquired. Therefore, acquisition decision should be an outcome of an integrated planning & decision making process. Asset intensive organizations both, Government and non Government in Australia spent AUD 102.5 Billion on asset acquisition in year 2008-09. There is widespread evidence of many assets and spare not being used or utilized and in the end are written off. This clearly shows that many organizations end up buying assets or spares which were not required or non-conforming to the needs of user functions. It is due the fact that strategic and software driven procurement process do not consider all the requirements from various functions within the organization which contribute to the operation and maintenance of the asset over its life cycle. There is a lot of research done on how to implement an effective procurement process. There are numerous software solutions available for executing a procurement process. However, not much research is done on how to arrive at a cross functional procurement planning process. It is also important to link procurement planning process to procurement execution process. This research will discuss ““Acquisition Engineering Model” (AEM) framework, which aims at assisting acquisition decision making based on various criteria to satisfy cross-functional organizational requirements. Acquisition Engineering Model (AEM) will consider inputs from corporate asset management strategy, production management, maintenance management, warehousing, finance and HSE. Therefore, it is essential that the multi-criteria driven acquisition planning process is carried out and its output is fed to the asset acquisition (procurement execution) process. An effective procurement decision making framework to perform acquisition planning which considers various functional criteria will be discussed in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Without the virtually free services of nature like clean air and water, humans would not last long. Natural systems can be incorporated in existing urban structures or spaces to add public amenity, mitigate the heat island eff ect, reduce pollution, add oxygen, and ensure water, electricity and food security in urban areas. Th ere are many eco-solutions that could radically reduce resource consumption and pollution and even provide surplus ecosystem services in the built environment at little or no operational cost, if adequately supported by design. Th is is the second part of a two part paper that explains what eco-services are, then provides examples of how design can generate natural as well as social capital. Using examples of actual and notional solutions, both papers set out to challenge designers to ‘think again’, and invent ways of creating net positive environmental gains through built environment design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Violence in nightclubs is a serious problem that has the Australian government launching multimillion dollar drinking campaigns. Research on nightclub violence has focused on identifying contributing social and environmental factors, with many concentrating on a variety of specific issues ranging from financial standpoints with effective target marketing strategies to legal obligations of supplying alcohol and abiding regulatory conditions. Moreover, existing research suggests that there is no single factor that directly affects the rate violence in licensed venues. As detailed in the review paper of Koleczko and Garcia Hansen (2011), there is little research about the physical environment of nightclubs and which specific design properties can be used to determine design standards to ensure/improve the physical design of nightclub environments to reduce patron violence. This current study seeks to address this omission by reporting on a series of interviews with participants from management and design domains. Featured case studies are both located in Fortitude Valley, a Mecca for party-goers and the busiest nightclub district in Queensland. The results and analysis support the conclusions that a number of elements of the physical environment influence elevated patron aggression and assault.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes an effective method for signal-authentication and spoofing detection for civilian GNSS receivers using the GPS L1 C/A and the Galileo E1-B Safety of Life service. The paper discusses various spoofing attack profiles and how the proposed method is able to detect these attacks. This method is relatively low-cost and can be suitable for numerous mass-market applications. This paper is the subject of a pending patent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study Krylov subspace methods for approximating the matrix-function vector product φ(tA)b where φ(z) = [exp(z) - 1]/z. This product arises in the numerical integration of large stiff systems of differential equations by the Exponential Euler Method, where A is the Jacobian matrix of the system. Recently, this method has found application in the simulation of transport phenomena in porous media within mathematical models of wood drying and groundwater flow. We develop an a posteriori upper bound on the Krylov subspace approximation error and provide a new interpretation of a previously published error estimate. This leads to an alternative Krylov approximation to φ(tA)b, the so-called Harmonic Ritz approximant, which we find does not exhibit oscillatory behaviour of the residual error.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To comprehensively measure the burden of hepatitis B, liver cirrhosis and liver cancer in Shandong province, using disability-adjusted life years (DALYs) to estimate the disease burden attribute to hepatitis B virus (HBV)infection. Methods: Based on the mortality data of hepatitis B, liver cirrhosis and liver cancer derived from the third National Sampling Retrospective Survey for Causes of Death during 2004 and 2005, the incidence data of hepatitis B and the prevalence and the disability weights of liver cancer gained from the Shandong Cancer Prevalence Sampling Survey in 2007, we calculated the years of life lost (YLLs), years lived with disability (YLDs) and DALYs of three diseases following the procedures developed for the global burden of disease (GBD) study to ensure the comparability. Results: The total burden for hepatitis B, liver cirrhosis and liver cancer were 211 616 (39 377 YLLs and 172 239 YLDs), 16 783 (13 497 YLLs and 3286 YLDs) and 247 795 (240 236 YLLs and 7559 YLDs) DALYs in 2005 respectively, and men were 2.19, 2.36 and 3.16 times as that for women, respectively in Shandong province. The burden for hepatitis B was mainly because of disability (81.39%). However, most burden on liver cirrhosis and liver cancer were due to premature death (80.42% and 96.95%). The burden of each patient related to hepatitis B, liver cirrhosis and liver cancer were 4.8, 13.73 and 11.11 respectively. Conclusion: Hepatitis B, liver cirrhosis and liver cancer caused considerable burden to the people living in Shandong province, indicating that the control of hepatitis B virus infection would bring huge potential benefits.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the international community struggles to find a cost-effective solution to mitigate climate change and reduce greenhouse gas emissions, carbon capture and storage (CCS) has emerged as a project mechanism with the potential to assist in transitioning society towards its low carbon future. Being a politically attractive option, legal regimes to promote and approve CCS have proceeded at an accelerated pace in multiple jurisdictions including the European Union and Australia. This acceleration and emphasis on the swift commercial deployment of CCS projects has left the legal community in the undesirable position of having to advise on the strengths and weaknesses of the key features of these regimes once they have been passed and become operational. This is an area where environmental law principles are tested to their very limit. On the one hand, implementation of this new technology should proceed in a precautionary manner to avoid adverse impacts on the atmosphere, local community and broader environment. On the other hand, excessive regulatory restrictions will stifle innovation and act as a barrier to the swift deployment of CCS projects around the world. Finding the balance between precaution and innovation is no easy feat. This is an area where lawyers, academics, regulators and industry representatives can benefit from the sharing of collective experiences, both positive and negative, across the jurisdictions. This exemplary book appears to have been collated with this philosophy in mind and provides an insightful addition to the global dialogue on establishing effective national and international regimes for the implementation of CCS projects...