217 resultados para door stop


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Assessment and prediction of the impact of vehicular traffic emissions on air quality and exposure levels requires knowledge of vehicle emission factors. The aim of this study was quantification of emission factors from an on road, over twelve months measurement program conducted at two sites in Brisbane: 1) freeway type (free flowing traffic at about 100 km/h, fleet dominated by small passenger cars - Tora St); and 2) urban busy road with stop/start traffic mode, fleet comprising a significant fraction of heavy duty vehicles - Ipswich Rd. A physical model linking concentrations measured at the road for specific meteorological conditions with motor vehicle emission factors was applied for data analyses. The focus of the study was on submicrometer particles; however the measurements also included supermicrometer particles, PM2.5, carbon monoxide, sulfur dioxide, oxides of nitrogen. The results of the study are summarised in this paper. In particular, the emission factors for submicrometer particles were 6.08 x 1013 and 5.15 x 1013 particles per vehicle-1 km-1 for Tora St and Ipswich Rd respectively and for supermicrometer particles for Tora St, 1.48 x 109 particles per vehicle-1 km-1. Emission factors of diesel vehicles at both sites were about an order of magnitude higher than emissions from gasoline powered vehicles. For submicrometer particles and gasoline vehicles the emission factors were 6.08 x 1013 and 4.34 x 1013 particles per vehicle-1 km-1 for Tora St and Ipswich Rd, respectively, and for diesel vehicles were 5.35 x 1014 and 2.03 x 1014 particles per vehicle-1 km-1 for Tora St and Ipswich Rd, respectively. For supermicrometer particles at Tora St the emission factors were 2.59 x 109 and 1.53 x 1012 particles per vehicle-1 km-1, for gasoline and diesel vehicles, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

intimate drowning 50 minute performance + installation work ice | salt | tears | This work is about death. Grief The relationships before The aftermath - of confusion, violence, isolation The never ending questions The devastating loss and paranoia "Since my wife died, I have spent the last six years treading water - trying to stop myself from drowning. Sometimes I catch myself not breathing. I have to remind myself that I can't live underwater no matter how much I want to." Grief. Loss. Tears. Fear. Sadness Water. Milk. Salt. Ice Falling. Waiting Submerged. Suffocated. Broken ties Intention. Lack of focus. Intensity of focus Fighting. Screaming. Wailing Blue. White. Black. Blackness The doors open: we walk through a gauze curtain and discover a dark space with a square of light in the middle of the room. As we walk closer to the light, we see a girl writing in charcoal on the floor around a square box filled with milk. She is writing the same thing over and over. The more she writes the more desperate she becomes: I am listening… We have to keep walking past. She isn’t writing for us. We find our seats Two people: one slowly breaking the hundreds of fragile strings that tie her to the other. The other is pleading with her to stop: Please. Please don’t. Please Avril. …Please don’t One girl facing away from us. She is slowly swimming on the spot without water. Projected next to her are images of her drowning under water. Salt falls in front of her. Behind her. A wall of salt. She is bound to the spot. Underwater and still breathing. Swimming in her own tears. She won’t escape. She wants to stay, but desires nothing Two people standing in a large square box filled with milk. They start in intimacy. The relationship begins to dissolve before us. One fights to be with/on/behind the other. The other fights her off. The milk is splashed. Why aren't they being careful? In the darkness there is scrubbing. Someone is scrubbing the floor. The other girl is on her knees trying to erase the original writing. The traces left behind that we have no control over. We only see her for a second, but hear her in the darkness. Scrubbing. It is pointless. You can't erase the past.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We assess the increase in particle number emissions from motor vehicles driving at steady speed when forced to stop and accelerate from rest. Considering the example of a signalized pedestrian crossing on a two-way single-lane urban road, we use a complex line source method to calculate the total emissions produced by a specific number and mix of light petrol cars and diesel passenger buses and show that the total emissions during a red light is significantly higher than during the time when the light remains green. Replacing two cars with one bus increased the emissions by over an order of magnitude. Considering these large differences, we conclude that the importance attached to particle number emissions in traffic management policies be reassessed in the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since China’s Economic Reform and its Open Door Policy, China has entered a new era of education (Adamson, 2002; Hu, 2005a). English has gained status as a language for international relations (Graddol, 1997) and international trade (Qu, 2007). Hence, in 2001, China’s Ministry of Education (MOE) required universities to offer 5-10% of their course units in English, particularly in the fields of information technology, biotechnology, finance and law (Jen, 2001; MOE, 2001). However, “the upgrading of national English proficiency, then, is predicted largely on the professional competence of the teaching force” (Hu, 2005b, p. 655). For TEFL academics, one component of this competence is the capacity to conduct research (Day, 1991; Shu, 2002). Indeed, research productivity has become essential for university success, and academics’ employment and promotional prospects. This study aims to investigate 182 Chinese TEFL academics’ research outputs across three Chinese higher education institutions through the research question: What are the research productivity levels of Chinese TEFL academics? A survey instrument was devised to gather TEFL academics’ calculations of research productivity and, in particular, the quality and quantity of research outputs over a five-year period (2004-2008). Descriptive statistics through SPSS were used to analyse data across research output fields (e.g., journal articles, conference papers). Academic status varied (n=182; teaching assistants 23.6%, lecturers 47.3%, associate professors 22.5%, and professors 6.6%) as did years of teaching (1-5 years 27.4%, 6-10 years 24.7%, 11-15 18.1%, 16-20 years 13.7%, > 21 years 15.9%). Results (n=182, male=27%, females=73%) indicated 18% had not produced any research in the five-year period. Indeed, more than 70% had produced no research in all categories except non-core journal articles and provincial projects. An overwhelming majority of TEFL academics had zero productivity in 10 of the 12 categories. Nevertheless, there were highly-productive TEFL academics, who had produced five or more pieces of research across the 12 categories. In addition, there was not much difference between sole and co-authored research outputs, except non-core journal articles where sole authored work was 20% higher than co-authored work. China’s desire for international competitiveness in education will require measures that facilitate higher levels of research productivity. These measures must include professional development, support and mentoring programs, and employment of personnel who can guide these processes. Research performance is an outcome, hence there is a need to understand Chinese TEFL academics’ perceptions about research, and experiences that may hinder and facilitate higher research productivity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Inverse dynamics is the most comprehensive method that gives access to the net joint forces and moments during walking. However it is based on assumptions (i.e., rigid segments linked by ideal joints) and it is known to be sensitive to the input data (e.g., kinematic derivatives, positions of joint centres and centre of pressure, inertial parameters). Alternatively, transducers can be used to measure directly the load applied on the residuum of transfemoral amputees. So, the purpose of this study was to compare the forces and moments applied on a prosthetic knee measured directly with the ones calculated by three inverse dynamics computations - corresponding to 3 and 2 segments, and « ground reaction vector technique » - during the gait of one patient. The maximum RMSEs between the estimated and directly measured forces (i.e., 56 N) and moment (i.e., 5 N.m) were relatively small. However the dynamic outcomes of the prosthetic components (i.e., absorption of the foot, friction and limit stop of the knee) were only partially assessed with inverse dynamic methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives. We tested predictions from the elaborated intrusion (EI) theory of desire, which distinguishes intrusive thoughts and elaborations, and emphasizes the importance of imagery. Secondarily, we undertook preliminary evaluations of the Alcohol Craving Experience (ACE) questionnaire, a new measure based on EI Theory. Methods. Participants (N ¼ 232) were in correspondence-based treatment trials for alcohol abuse or dependence. The study used retrospective reports obtained early in treatment using the ACE, and daily self-monitoring of urges, craving, mood and alcohol consumption. Results. The ACE displayed high internal consistency and test – retest reliability and sound relationships with self-monitored craving, and was related to Baseline alcohol dependence, but not to consumption. Imagery during craving was experienced by 81%,with 2.3 senses involved on average. More frequent imagery was associated with longer episode durations and stronger craving. Transient intrusive thoughts were reported by 87% of respondents, and were more common if they frequently attempted to stop alcohol cognitions. Associations between average daily craving and weekly consumption were seen. Depression and negative mood were associated with more frequent, stronger and longer lasting desires for alcohol. Conclusions. Results supported the distinction of automatic and controlled processes in craving, together with the importance of craving imagery. They were also consistent with prediction of consumption from cross-situational averages of craving, and with positive associations between craving and negative mood. However, this study’s retrospective reporting and correlational design require that its results be interpreted cautiously. Research using ecological momentary measures and laboratory manipulations is needed before confident inferences about causality can be made.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

President’s Message Hello fellow AITPM members, Well I can’t believe it’s already October! My office is already organising its end of year function and looking to plan for 2010. Our whole School is moving to a different building next year, with the lovely L block eventually making way for a new shiny one. Those of you who have entered the Brisbane CBD from the south side, across the Captain Cook Bridge, would know L block as the big 9 storey brick and concrete Lego block ode to 1970’s functional architecture, which greets you on the right hand side. Onto traffic matters: an issue that has been tossing around in my mind of late is that of speed. I know I am growing older and may be prematurely becoming a “grumpy old man”, but everyone around me locally seems to be accelerating off from the stop line much faster than I was taught to for economical driving, both here and in the United States (yes they made my wife and me resit our written and practical driving tests when we lived there). People here in Australia also seem to be driving right on top of the posted speed limit, on whichever part of the Road Hierarchy, whether urban or rural. I was also taught on both sides of the planet that the posted speed limit is a maximum legal speed, not the recommended driving speed. This message did seem to sink in to the American drivers around me when we lived in Oregon - where people did appear to drive more cautiously. Further, posted speed limits in Oregon were, and I presume still are, set more conservative by about 5mph or 10km/h than Australian limits, for any given part of the Road Hierarchy. Another excellent speed limit treatment used in Oregon was in school zones, where reduced speed limits applied “when children are present” rather than during prescribed hours on school days. This would be especially useful here in Australia, where a lot of extra-curricular activities take place around schools outside of the prescribed speed limit hours. Before and after hours school care is on the increase (with parents dropping and collecting children near dawn and dusk in the winter), and many childcentred land uses are located adjacent to schools, such as Scouts/Guides halls, swimming pools and parks. Consequentially, I believe there needs to be some consideration towards more public campaigning about economical driving and the real purpose of the speed limit = or perhaps even a rethink of the speed limit concept, if people really are driving on top of it and it’s not just me becoming grumpier (our industrial psychology friends at the research centres may be able to assist us here). The Queensland organising committee is now in full swing organising the 2010 AITPM National Conference, What’s New?, so please keep a lookout for related content. Best regards to all, Jon Bunker PS A Cartoonists view of traffic engineers I thought you might enjoy this. http://xkcd.com/277/

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the widespread applications of electronic learning (e-Learning) technologies to education at all levels, increasing number of online educational resources and messages are generated from the corresponding e-Learning environments. Nevertheless, it is quite difficult, if not totally impossible, for instructors to read through and analyze the online messages to predict the progress of their students on the fly. The main contribution of this paper is the illustration of a novel concept map generation mechanism which is underpinned by a fuzzy domain ontology extraction algorithm. The proposed mechanism can automatically construct concept maps based on the messages posted to online discussion forums. By browsing the concept maps, instructors can quickly identify the progress of their students and adjust the pedagogical sequence on the fly. Our initial experimental results reveal that the accuracy and the quality of the automatically generated concept maps are promising. Our research work opens the door to the development and application of intelligent software tools to enhance e-Learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examined findings (e.g., A. J. Yates and J. Thain [see PA, Vol 73:28269]) that suggest that perceived social support for attempts to quit smoking is a determinant of self-efficacy (SE). 102 adults (aged 18–71 yrs) who participated in a trial of 4 smoking interventions were studied over a 10-mo follow-up period. The study attested to the validity of SE as a predictor of sustained success from an attempt to stop smoking. The tendency for SE theory to be more strongly supported in the longer term was highly consistent with the proposed mechanism for SE effects. The absence of a relationship with perceived social support might be an advantage for SE, since support was a poor predictor of outcomes during follow-up. Results suggest that perceived social influences had less utility than personal skills and SE in predicting sustained non-smoking outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over recent decades there has been growing interest in the role of non-motorized modes in the overall transport system (especially walking and cycling for private purposes) and many government initiatives have been taken to encourage these active modes. However there has been relatively little research attention given to the paid form of non-motorized travel which can be called non-motorized public transport (NMPT). This involves cycle-powered vehicles which can carry several passengers (plus the driver) and a small amount of goods; and which provide flexible hail-and-ride services. Effectively they are non-motorized taxis. Common forms include cycle-rickshaw (Bangladesh, India), becak (Indonesia), cyclos (Vietnam, Cambodia), bicitaxi (Columbia, Cuba), velo-taxi (Germany, Netherland), and pedicabs (UK, Japan, USA). --------- The popularity of NMPT is widespread in developing countries, where it caters for a wide range of mobility needs. For instance in Dhaka, Bangladesh, rickshaws are the preferred mode for non-walk trips and have a higher mode share than cars or buses. Factors that underlie the continued existence and popularity of NMPT in many developing countries include positive contribution to social equity, micro-macro economic significance, employment creation, and suitability for narrow and crowded streets. Although top speeds are lower than motorized modes, NMPT is competitive and cost-effective for short distance door-to-door trips that make up the bulk of travel in many developing cities. In addition, NMPT is often the preferred mode for vulnerable groups such as females, children and elderly people. NMPT is more prominent in developing countries but its popularity and significance is also gradually increasing in several developed countries of Asia, Europe and parts of North America, where there is a trend for the NMPT usage pattern to broaden from tourism to public transport. This shift is due to a number of factors including the eco-sustainable nature of NMPT; its operating flexibility (such as in areas where motorized vehicle access is restricted or discouraged through pricing); and the dynamics that it adds to the urban fabric. Whereas NMPT may have been seen as a “dying” mode, in many cities it is maintaining or increasing its significance and with potential for further growth. --------- This paper will examine and analyze global trends in NMPT incorporating both developing and developed country contexts and issues such as usage patterns; NMPT policy and management practices; technological development; and operational integration of NMPT into the overall transport system. It will look at how NMPT policies, practices and usage have changed over time and the differing trends in developing and developed countries. In particular, it will use Dhaka, Bangladesh as a case study in recognition of its standing as the major NMPT city in the world. The aim is to highlight NMPT issues and trends and their significance for shaping future policy towards NMPT in developing and developed countries. The paper will be of interest to transport planners, traffic engineers, urban and regional planners, environmentalists, economists and policy makers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Environmental impacts caused during Australia's comparatively recent settlement by Europeans are evident. Governments (both Commonwealth and States) have been largely responsible for requiring landholders – through leasehold development conditions and taxation concessions – to conduct clearing that is now perceived as damage. Most governments are now demanding resource protection. There is a measure of bewilderment (if not resentment) among landholders because of this change. The more populous States, where most overall damage has been done (i.e. Victoria and New South Wales), provide most support for attempts to stop development in other regions where there has been less damage. Queensland, i.e. the north-eastern quarter of the continent, has been relatively slow to develop. It also holds the largest and most diverse natural environments. Tree clearing is an unavoidable element of land development, whether to access and enhance native grasses for livestock or to allow for urban developments (with exotic tree plantings). The consequences in terms of regulations are particularly complex because of the dynamic nature of vegetation. The regulatory terms used in current legislation – such as 'Endangered' and 'Of concern' – depend on legally-defined, static baselines. Regrowth and fire damage are two obvious causes of change. A less obvious aspect is succession, where ecosystems change naturally over long timeframes. In the recent past, the Queensland Government encouraged extensive tree-clearing e.g. through the State Brigalow Development Scheme (mostly 1962 to 1975) which resulted in the removal of some 97% of the wide-ranging mature forests of Acacia harpophylla. At the same time, this government controls National Parks and other reservations (occupying some 4% of the State's 1.7 million km2 area) and also holds major World Heritage Areas (such as the Great Barrier Reef and the Wet Tropics Rainforest) promulgated under Commonwealth legislation. This is a highly prescriptive approach, where the community is directed on the one hand to develop (largely through lease conditions) and on the other to avoid development (largely by unusable reserves). Another approach to development and conservation is still possible in Queensland. For this to occur, however, a more workable and equitable solution than has been employed to date is needed, especially for the remote lands of this State. This must involve resident landholders, who have the capacity (through local knowledge, infrastructure and daily presence) to undertake most costeffectively sustainable land-use management (with suitable attention to ecosystems requiring special conservation effort), that is, provided they have the necessary direction, encouragement and incentive to do so.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The obesity epidemic is a global trend and is of particular concern in children. Recent reports have highlighted the severity of obesity in children by suggesting: “today's generation of children will be the first for over a century for whom life expectancy falls.” This review assesses the evidence that identifies the important role of physical activity in the growth, development and physical health of young people, owing to its numerous physical and psychological health benefits. Key issues, such as “does a sedentary lifestyle automatically lead to obesity” and “are levels of physical activity in today's children less than physical activity levels in children from previous generations?”, are also discussed. Today's environment enforces an inactive lifestyle that is likely to contribute to a positive energy balance and childhood obesity. Whether a child or adolescent, the evidence is conclusive that physical activity is conducive to a healthy lifestyle and prevention of disease. Habitual physical activity established during the early years may provide the greatest likelihood of impact on mortality and longevity. It is evident that environmental factors need to change if physical activity strategies are to have a significant impact on increasing habitual physical activity levels in children and adolescents. There is also a need for more evidence-based physical activity guidelines for children of all ages. Efforts should be concentrated on facilitating an active lifestyle for children in an attempt to put a stop to the increasing prevalence of obese children

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the years, approaches to obesity prevention and treatment have gone from focusing on genetic and other biological factors to exploring a diversity of diets and individual behavior modification interventions anchored primarily in the power of the mind, to the recent shift focusing on societal interventions to design ";temptation-proof"; physical, social, and economic environments. In spite of repeated calls to action, including those of the World Health Organization (WHO), the pandemic continues to progress. WHO recently projected that if the current lifestyle trend in young and adult populations around the world persist, by 2012 in countries like the USA, health care costs may amount to as much as 17.7% of the GDP. Most importantly, in large part due to the problems of obesity, those children may be the first generation ever to have a shorter life expectancy than that of their parents. This work presents the most current research and proposals for addressing the pandemic. Past studies have focused primarly on either genetic or behavioral causes for obesity, however today's research indicates that a strongly integrated program is the best prospect for success in overcoming obesity. Furthermore, focus on the role of society in establishing an affordable, accessible and sustainable program for implementing these lifestyle changes is vital, particularly for those in economically challenged situations, who are ultimately at the highest risk for obesity. Using studies from both neuroscience and behavioral science to present a comprehensive overview of the challenges and possible solutions, The brain-to-society approach to obesity prevention focuses on what is needed in order to sustain a healthy, pleasurable and affordable lifestyle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.