302 resultados para Balls (Parties)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

AC motors are largely used in a wide range of modern systems, from household appliances to automated industry applications such as: ventilations systems, fans, pumps, conveyors and machine tool drives. Inverters are widely used in industrial and commercial applications due to the growing need for speed control in ASD systems. Fast switching transients and the common mode voltage, in interaction with parasitic capacitive couplings, may cause many unwanted problems in the ASD applications. These include shaft voltage and leakage currents. One of the inherent characteristics of Pulse Width Modulation (PWM) techniques is the generation of the common mode voltage, which is defined as the voltage between the electrical neutral of the inverter output and the ground. Shaft voltage can cause bearing currents when it exceeds the amount of breakdown voltage level of the thin lubricant film between the inner and outer rings of the bearing. This phenomenon is the main reason for early bearing failures. A rapid development in power switches technology has lead to a drastic decrement of switching rise and fall times. Because there is considerable capacitance between the stator windings and the frame, there can be a significant capacitive current (ground current escaping to earth through stray capacitors inside a motor) if the common mode voltage has high frequency components. This current leads to noises and Electromagnetic Interferences (EMI) issues in motor drive systems. These problems have been dealt with using a variety of methods which have been reported in the literature. However, cost and maintenance issues have prevented these methods from being widely accepted. Extra cost or rating of the inverter switches is usually the price to pay for such approaches. Thus, the determination of cost-effective techniques for shaft and common mode voltage reduction in ASD systems, with the focus on the first step of the design process, is the targeted scope of this thesis. An introduction to this research – including a description of the research problem, the literature review and an account of the research progress linking the research papers – is presented in Chapter 1. Electrical power generation from renewable energy sources, such as wind energy systems, has become a crucial issue because of environmental problems and a predicted future shortage of traditional energy sources. Thus, Chapter 2 focuses on the shaft voltage analysis of stator-fed induction generators (IG) and Doubly Fed Induction Generators DFIGs in wind turbine applications. This shaft voltage analysis includes: topologies, high frequency modelling, calculation and mitigation techniques. A back-to-back AC-DC-AC converter is investigated in terms of shaft voltage generation in a DFIG. Different topologies of LC filter placement are analysed in an effort to eliminate the shaft voltage. Different capacitive couplings exist in the motor/generator structure and any change in design parameters affects the capacitive couplings. Thus, an appropriate design for AC motors should lead to the smallest possible shaft voltage. Calculation of the shaft voltage based on different capacitive couplings, and an investigation of the effects of different design parameters are discussed in Chapter 3. This is achieved through 2-D and 3-D finite element simulation and experimental analysis. End-winding parameters of the motor are also effective factors in the calculation of the shaft voltage and have not been taken into account in previous reported studies. Calculation of the end-winding capacitances is rather complex because of the diversity of end winding shapes and the complexity of their geometry. A comprehensive analysis of these capacitances has been carried out with 3-D finite element simulations and experimental studies to determine their effective design parameters. These are documented in Chapter 4. Results of this analysis show that, by choosing appropriate design parameters, it is possible to decrease the shaft voltage and resultant bearing current in the primary stage of generator/motor design without using any additional active and passive filter-based techniques. The common mode voltage is defined by a switching pattern and, by using the appropriate pattern; the common mode voltage level can be controlled. Therefore, any PWM pattern which eliminates or minimizes the common mode voltage will be an effective shaft voltage reduction technique. Thus, common mode voltage reduction of a three-phase AC motor supplied with a single-phase diode rectifier is the focus of Chapter 5. The proposed strategy is mainly based on proper utilization of the zero vectors. Multilevel inverters are also used in ASD systems which have more voltage levels and switching states, and can provide more possibilities to reduce common mode voltage. A description of common mode voltage of multilevel inverters is investigated in Chapter 6. Chapter 7 investigates the elimination techniques of the shaft voltage in a DFIG based on the methods presented in the literature by the use of simulation results. However, it could be shown that every solution to reduce the shaft voltage in DFIG systems has its own characteristics, and these have to be taken into account in determining the most effective strategy. Calculation of the capacitive coupling and electric fields between the outer and inner races and the balls at different motor speeds in symmetrical and asymmetrical shaft and balls positions is discussed in Chapter 8. The analysis is carried out using finite element simulations to determine the conditions which will increase the probability of high rates of bearing failure due to current discharges through the balls and races.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer-to-Patent Australia will initially run as a 12 month pilot project designed to test whether an open community of reviewers can effectively locate prior art that might not otherwise be located by the patent office during a typical examination. Patent applications will be made available for peer review for a period of 6 months and there will follow a 6 month period of joint qualitative and quantitative assessment of the pilot project by IP Australia and QUT. The objective of Peer-to-Patent Australia is to improve the patent examination process and the quality of issued patents by utilising the knowledge and skills of experts in the broader community. It is a way of linking the scientific and technical expertise of anyone with an Internet connection with the expertise of a patent examiner. That community participation consists of members of the public reviewing patent applications and contributing relevant prior art references and comments within a web-based forum. The aim is to bring to light prior art, particularly non-patent prior art, that might otherwise not be identified by patent examiners. The better the prior art resources a patent examiner has at his or her disposal, the more likely a patent application will be assessed properly in terms of novelty and inventive step. The role of Peer-to-Patent Australia in this regard is to act as both a facilitator of discussion and a collector of prior art submissions. Peer-to-Patent Australia collects relevant prior art references on behalf of the reviewing community and forwards that prior art to IP Australia. Section 27 of the Patents Act 1990 (Cth) allows for the Commissioner of Patents to receive submissions of prior art by third parties relevant to the novelty and inventiveness of a particular patent application.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper raises the question of whether comparative national models of communications research can be developed, along the lines of Hallin and Mancini’s (2004) analysis of comparative media policy, or the work of Perraton and Clift (2004) on comparative national capitalisms. Taking consideration of communications research in Australia and New Zealand as its starting point, the paper will consider what are relevant variables in shaping an “intellectual milieu” for communications research in these countries, as compared to those of Europe, North America and Asia. Some possibly relevant variables include: • Type of media system (e.g. how significant is public service media?); • Political culture (e.g. are there significant left-of-centre political parties?); • Dominant intellectual traditions; • Level and types of research funding; • Overall structure of higher education system, and where communications sits within it. In considering whether such an exercise can or should be undertaken, we can also evaluate, as Hallin and Mancini do, the significance of potentially homogenizing forces. These would include globalization, new media technologies, and the rise of a global “audit culture”. The paper will raise these issues as questions that emerge as we consider, as Curran and Park (2000) and Thussu (2009) have proposed, what a “de-Westernized” media and communications research paradigm may look like.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sports sponsorship increasingly provides organisations with the opportunity to reach their target audiences in a manner that facilitates engagement and encourages relationship development. This paper provides an Australian perspective of the value of sports sponsorship using a case study of WOW Sight and Sound’s long-term sponsorship of the Brisbane Broncos rugby league team. The case study investigates WOW’s marketing objectives which centre generating brand awareness using sponsorship with the Brisbane Broncos as an integrated marketing communications tool. WOW believes that the integration of its sponsorship of the Broncos with the team’s total marketing plan is integral to its success. This integration requires the facilitation of two-way communications between WOW, its advertising agency, the Brisbane Broncos and customers to ensure that all parties’ needs are met.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book addresses the modern law relating to adoption. It comes at a time of fundamental change in adoption practice as, increasingly, Irish couples look outside the jurisdiction for the child that will make their family complete.---------- * Examines and explains the new regulatory framework and the law now governing domestic and intercountry adoption.---------- * Provides a guide to the changes outlined in the Adoption Bill 2008 which also consolidates the provisions of seven previous statutes and incorporates the Hague Convention into Irish statute law.---------- * Considers the responsibilities of the new Adoption Authority, and the roles of other administrative and legal bodies.---------- * Sets out the adoption process, explaining the complexities of intercountry adoption, giving consideration to the interface between adoption and children in care and dealing with the rights of the parties involved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Government of Indonesia (GoI) increasingly relies on the private sector financing to build and operate infrastructures through public private partnership (PPP) schemes. However, PPP does not automatically provide the solution for the financing scheme due to value for money (VFM) issues. The procurement authority must show whether a PPP proposal is the optimal solution that provides best VFM outcome. The paper presents a literature review of comparing quantitative VFM methodology for PPP infrastructure project procurement in Indonesia and Australia. Public Sector Comparator (PSC) is used to assess the potential project VFM quantitatively in Australia. In Indonesia, the PSC has not been applied, where the PPP procurement authority tends to utilize a common project evaluation method that ignores the issues of risk. Unlike the conventional price bid evaluation, the PSC enables a financial comparison including costs/gains and risks. Since the construction of PSC is primarily on risk management approach, it can facilitate risk negotiation processes between the involved parties. The study indicates that the quantitative VFM methodology of PSC is potentially applicable in Indonesia for water supply sector. Various supporting regulations are available that emphasize the importance of VFM and risk management in infrastructure investment. However, the study also reveals a number of challenges that need to be anticipated, such as the need of a more comprehensive PPP policy at both central and local government level, a more specific legal instrument for bidding evaluation method and the issue of institutional capacity development in PPP Units at the local level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been studied, current models do not seriously take into account the issue of delegation commitment of the involved parties. In order to address this issue, this paper introduces a new mechanism to help parties involved in the delegation process to express commitment constraints, perform the commitments and track the committed actions. This mechanism looks at two different aspects: pre-delegation commitment and post-delegation commitment. In pre-delegation commitment, this mechanism enables the involved parties to express the delegation constraints and address those constraints. The post-delegation commitment phase enables those parties to inform the delegator and service providers how the commitments are conducted. This mechanism utilises a modified SAML assertion structure to support the proposed delegation and constraint approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of parliamentary questions is the most popular and visible tool in the hands of the Opposition as a means to make government accountable. Their main purpose is to seek information or press for action. Contemporary parliamentary literature from the UK, Canada, and Australia, however, suggests that parliamentary questions have lost their effectiveness. The literature points out that Question Time in parliaments has become a battle ground between Ruling and Opposition parties in their fight to gain maximum political advantage. In this context, the effectiveness of parliamentary questions in the Indian state legislatures has not been investigated. The aim of this study, therefore, is to analyse the use, purpose and effectiveness of parliamentary questions in the State Legislative Assembly of Uttar Pradesh (India) to explore differences, if any, between Ruling and Opposition parties. In this study, 4023 parliamentary questions asked in the Uttar Pradesh State Legislative Assembly were analysed. The effectiveness of answers was also analysed qualitatively. The results show that half of the total members of the Assembly used this device, out of which 60% of the questions were asked by the Opposition party members. 31% of the questions from the Opposition were seeking information and 69% were pressing for action. The government provided the required information in 96% of the questions in the former category and took action in only 35% of the latter category. Furthermore, 60% of the questions raised by the Opposition were related to constituency matters and the remaining 40% were related to policy issues or public welfare. Comparing the data with the ruling party, the results indicate that the use,purpose and effectiveness of parliamentary questions were similar to that of the Opposition except some minor differences. Surprisingly, there was no evidence of any ‘Dorothy Dix’ questions. The study concludes parliamentary question is an effective device in the Indian state of Uttar Pradesh.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This short paper suggests that the categories of ‘transformational’ and ‘transactional’ leadership styles ( see Burns 1972) may provide analytical purchase on the question of whether current women leaders have radically different styles and approaches to the earlier second wave feminist generation. The two cases chosen for this paper are the senior women in the Labor and Liberal Parties – Julia Gillard and Julie Bishop. The evidence – explored below – indicates there are strong transactional qualities to both women leaders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years there has been widespread interest in patterns, perhaps provoked by a realisation that they constitute a fundamental brain activity and underpin many artificial intelligence systems. Theorised concepts of spatial patterns including scale, proportion, and symmetry, as well as social and psychological understandings are being revived through digital/parametric means of visualisation and production. The effect of pattern as an ornamental device has also changed from applied styling to mediated dynamic effect. The interior has also seen patterned motifs applied to wall coverings, linen, furniture and artefacts with the effect of enhancing aesthetic appreciation, or in some cases causing psychological and/or perceptual distress (Rodemann 1999). ----- ----- While much of this work concerns a repeating array of surface treatment, Philip Ball’s The Self- Made Tapestry: Pattern Formation in Nature (1999) suggests a number of ways that patterns are present at the macro and micro level, both in their formation and disposition. Unlike the conventional notion of a pattern being the regular repetition of a motif (geometrical or pictorial) he suggests that in nature they are not necessarily restricted to a repeating array of identical units, but also include those that are similar rather than identical (Ball 1999, 9). From his observations Ball argues that they need not necessarily all be the same size, but do share similar features that we recognise as typical. Examples include self-organized patterns on a grand scale such as sand dunes, or fractal networks caused by rivers on hills and mountains, through to patterns of flow observed in both scientific experiments and the drawings of Leonardo da Vinci.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ross River virus (RRV) is a mosquito-borne member of the genus Alphavirus that causes epidemic polyarthritis in humans, costing the Australian health system at least US$10 million annually. Recent progress in RRV vaccine development requires accurate assessment of RRV genetic diversity and evolution, particularly as they may affect the utility of future vaccination. In this study, we provide novel RRV genome sequences and investigate the evolutionary dynamics of RRV from time-structured E2 gene datasets. Our analysis indicates that, although RRV evolves at a similar rate to other alphaviruses (mean evolutionary rate of approx. 8x10(-4) nucleotide substitutions per site year(-1)), the relative genetic diversity of RRV has been continuously low through time, possibly as a result of purifying selection imposed by replication in a wide range of natural host and vector species. Together, these findings suggest that vaccination against RRV is unlikely to result in the rapid antigenic evolution that could compromise the future efficacy of current RRV vaccines.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Alternative dispute resolution (a.d.r.) processes are entrenched in western style legal systems. Forms of dispute resolution are utilised within schools and health systems; built in to commercial contracts; found in workplaces, clubs and organisations; and accepted in general day-to-day community disputes. The a.d.r. literature includes references to ‘apology’, but is largely silent on ‘forgiveness’. Where an apology is offered as part of a dispute resolution process, practice suggests that formalised ‘forgiveness’ rarely follows. Mediators may agree there is a meaningful place for apology in dispute resolution processes, but are most unlikely to support a view that forgiveness, as a conscious act, has an equivalent place. Yet, if forgiveness is not limited to the ‘pardoning of an offence’, but includes a ‘giving up of resentment’, or the relinquishing of a grudge, then forgiveness may play an underestimated role in dispute management. In the context of some day-to-day dispute management practice, this paper questions whether forgiveness should follow an apology; and concludes that meaningful resolutions can be reached without any formal element of ‘forgiveness’ or absolution. However, dispute management practitioners need to be aware of the latent role other aspects of forgiveness may play for the disputing parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses how social media was used to leverage votes in new media environments. Barack Obama’s social media campaign is analysed and illustrates how the Obama brand benefited from integrating social media into the campaign. Voting behaviour has changed; politicians are continually seeking new ways to communicate with their constituents. Voting on political ‘brands’ is based on an identity or image, rather than central issues. While political parties rely upon an integrated marketing communication (IMC) approach, with a focus on building the (political) brand of the party and brand relationships, communication is no longer fully controlled by the marketers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – This research has been conducted with the aim of determining if celebrity endorsers in political party advertising have a significant impact on UK voter intentions. The use of celebrity endorsements is commonplace in the USA, but little is known about its effects in the UK. This research also aims to incorporate the use of celebrity endorsements in political party advertising with the political salience construct. Political salience represents how prominent politics and political issues are in the minds of the eligible voter. Design/methodology/approach – A 2 (endorser: celebrity; non-celebrity) £ 2 (political salience: high; low) between-subjects factorial design experiment was used. The results show that celebrity endorsements do play a significant role in attitudes towards the political advert, attitudes towards the endorser and voter intention. However, this effect is significantly moderated by political salience. Findings – The results show that low political salience respondents were significantly more likely to vote for the political party when a celebrity endorser is used. However, the inverse effect is found for high political salience respondents. Practical implications – The results offer significant insights into the effect that celebrity endorsers could have in future elections and the importance that political salience plays in the effectiveness of celebrity endorsement. If political parties are to target those citizens that do not actively engage with politics then the use of celebrity endorsements would make a significant impact, given the results of this research. Originality/value – This research would be of particular interest to political party campaigners as well as academics studying the effects of advertising and identity salience.