810 resultados para mobility control routing
Resumo:
Participation is a word frequently espoused in the literature of childhood and urban studies. It has also been made sacrosanct through the Convention on the Rights of the Child and other rights-based policy and programming. Despite this importance, what it means and how it is experienced in the everyday lives of children with diverse abilities is not well understood. This chapter provides insight into the everyday experiences of participation by ten children 9-12 years of age, who have diverse personal mobility from various physical conditions that affect muscle and movement differently, including: Muscular Dystrophy, Cerebral Palsy, and Autoimmune Rheumatic Diseases. The children participants live in the outer suburbs and inner regions of south-east Queensland, Australia. The chapter discusses a new way of understanding and theorising participation as a journey of becoming involved. This knowledge emerged through the children’s body-space-time routines (body ballets) and their descriptions of inhabiting urban space. This chapter also establishes how body-space-context interplays shape the experiences of becoming and being involved in everyday life, as well as the preconceptions of body embed in space which divide and constrain children and families actualisation of full and genuine participation.
Resumo:
Synthesis of high quality boron carbide (B4C) powder is achieved by carbothermal reduction of boron oxide (B2O3) from a condensed boric acid (H3BO3) / polyvinyl acetate (PVAc) product. Precursor solutions are prepared via polymerisation of vinyl acetate (VA) in methanol in the presence of dissolved H3BO3. With excess VA monomer being removed during evaporation of the solvent, the polymerisation time is then used to manage availability of carbon for reaction.
Resumo:
A field oriented control (FOC) algorithm is simulated and implemented for use with a permanent magnet synchronous motor (PMSM). Rotor position is sensed using Hall effect switches on the stator because other hardware position sensors attached to the rotor may not be desirable or cost effective for certain applications. This places a limit on the resolution of position sensing – only a few Hall effect switches can be placed. In this simulation, three sensors are used and the position information is obtained at higher resolution by estimating it from the rotor dynamics, as shown in literature previously. This study compares the performance of the method with an incremental encoder using simulations. The FOC algorithm is implemented using Digital Motor Control (DMC) and IQ Texas Instruments libraries from a Simulink toolbox called Embedded Coder, and downloaded into a TI microcontroller (TMS320F28335) known as the Piccolo via Code Composer Studio (CCS).
Resumo:
Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.