158 resultados para Passé
Resumo:
Penalties and sanctions to deter risky/illegal behaviours are important components of traffic law enforcement. Sanctions can be applied to the vehicle (e.g., impoundment), the person (e.g., remedial programs or jail), or the licence (e.g., disqualification). For licence sanctions, some offences attract automatic suspension while others attract demerit points which can indirectly lead to licence loss. In China, a licence is suspended when a driver accrues twelve demerit points within one year. When this occurs, the person must undertake a one-week retraining course at their own expense and successfully pass an examination to become relicensed. Little is known about the effectiveness of this program. A pilot study was conducted in Zhejiang Province to examine basic information about participants of a retraining course. The aim was to gather baseline data for future comparison. Participants were recruited at a driver retraining centre in a large city in Zhejiang Province. In total, 239 suspended drivers completed an anonymous questionnaire which included demographic information, driving history, and crash involvement. Overall, 87% were male with an overall mean age of 35.02 years (SD=8.77; range 21-60 years). A large proportion (83.3%) of participants owned a vehicle. Commuting to work was reported by 64% as their main reason for driving, while 16.3% reported driving for work. Only 6.4% reported holding a licence for 1 year or less (M=8.14 years, SD=6.5, range 1-31 years) and people reported driving an average of 18.06 hours/week (SD=14.4, range 1-86 hours). This represents a relatively experienced group, especially given the increase in new drivers in China. The number of infringements reportedly received in the previous year ranged from 2 to 18 (M=4.6, SD=3.18); one third of participants reported having received 5 or more infringements. Approximately one third also reported having received infringements in the previous year but not paid them. Various strategies for avoiding penalties were reported. The most commonly reported traffic violations were: drink driving (DUI; 0.02-0.08 mg/100ml) with 61.5% reporting 1 such violation; and speeding (47.7% reported 1-10 violations). Only 2.2% of participants reported the more serious drunk driving violation (DWI; above 0.08mg/100ml). Other violations included disobeying traffic rules, using inappropriate licence, and licence plate destroyed/not displayed. Two-thirds of participants reported no crash involvement in the previous year while 14.2% reported involvement in 2-5 crashes. The relationship between infringements and crashes was limited, however there was a small, positive significant correlation between crashes and speeding infringements (r=.2, p=.004). Overall, these results indicate the need for improved compliance with the law among this sample of traffic offenders. For example, lower level drink driving (DUI) and speeding were the most commonly reported violations with some drivers having committed a large number in the previous year. It is encouraging that the more serious offence of drunk driving (DWI) was rarely reported. The effectiveness of this driver retraining program and the demerit point penalty system in China is currently unclear. Future research including driver follow up via longitudinal study is recommended to determine program effectiveness to enhance road safety in China.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
A novel in-cylinder pressure method for determining ignition delay has been proposed and demonstrated. This method proposes a new Bayesian statistical model to resolve the start of combustion, defined as being the point at which the band-pass in-cylinder pressure deviates from background noise and the combustion resonance begins. Further, it is demonstrated that this method is still accurate in situations where there is noise present. The start of combustion can be resolved for each cycle without the need for ad hoc methods such as cycle averaging. Therefore, this method allows for analysis of consecutive cycles and inter-cycle variability studies. Ignition delay obtained by this method and by the net rate of heat release have been shown to give good agreement. However, the use of combustion resonance to determine the start of combustion is preferable over the net rate of heat release method because it does not rely on knowledge of heat losses and will still function accurately in the presence of noise. Results for a six-cylinder turbo-charged common-rail diesel engine run with neat diesel fuel at full, three quarters and half load have been presented. Under these conditions the ignition delay was shown to increase as the load was decreased with a significant increase in ignition delay at half load, when compared with three quarter and full loads.
Resumo:
In Queensland, there is little research that speaks to the historical experiences of schooling. Aboriginal education remains a part of the silenced history of Aboriginal people. This thesis presents stories of schooling from Aboriginal people across three generations of adult storytellers. Elders, grandparents, and young parents involved in an early childhood urban playgroup were included. Stories from the children attending the playgroup were also welcomed. The research methodology involved narrative storywork. This is culturally appropriate because Aboriginal stories connect the past with the present. The conceptual framework for the research draws on decolonising theory. Typically, reports of Aboriginal schooling and outcomes position Aboriginal families and children within a deficit discourse. The issues and challenges faced by urban Murri families who have young children or children in school are largely unknown. This research allowed Aboriginal families to participate in an engaged dialogue about their childhood and offered opportunities to tell their stories of education. Key research questions were: What was the reality of school for different generations of Indigenous people? What beliefs and values are held about mainstream education for Indigenous children? What ideas are communicated about school across generations? Narratives from five elders, five grandparents, and five (urban) mothers of young Indigenous children are presented. The elders offer testimony on their recollected experiences of schooling in a mission, a Yumba school (fringe-dwellers’ camp), and country schools. Their stories also speak to the need to pass as non-indigenous and act as “white”. The next generation of storytellers are the grandparents and they speak to their lives as “stolen children”. The final story tellers are the Murri parents. They speak to the current and recent past of education, as well as their family experiences as they parent young children who are about to enter school or who are in the early years of school.
Resumo:
From the early-to-mid 2000s, the Australian horror film production sector has achieved growth and prosperity of a kind not seen since its heyday of the 1980s. Australian horror films can be traced back to the early 1970s, when they experienced a measure of commercial success. However, throughout the twenty-first-century Australian horror gained levels of international recognition that have surpassed the cult status enjoyed by some of the films in the 1970s and 1980s. In recent years, Australia has emerged as a significant producer of breakout, cult, and solid B-grade horror films, which have circulated in markets worldwide. Australian horror’s recent successes have been driven by one of its distinguishing features: its international dimensions. As this chapter argues, the Australian horror film production sector is an export-oriented industry that relies heavily on international partnerships and presales (the sale of distribution rights prior to a film’s completion), and on its relationships with overseas distributors. Yet, these traits vary from film to film as the sector is comprised of several distinct domains of production activity, from guerrilla films destined for niche video markets like specialist cult video stores and online mail-order websites to high(er)-end pictures made for theatrical markets. Furthermore, the content and style of Australian horror movies has often been tailored for export. While some horror filmmakers have sought to play up the Australianness of their product, others have attempted to pass off their films as faux-American or as placeless films effaced of national reference points.
Resumo:
Numerous Abaqus [1] finite element analyses have been carried out using various plasticity models to investigate the effect of friction force on the rail head in relation to both the development of the accumulated plastic strain (PEEQ) and the changes in the depth of PEEQ distribution in the wheel-rail contact. The normal force distribution on the rail head was assumed to be Hertzian. The tangential force was implemented as a fraction of the normal force in the subroutine. Each analysis was carried out for a single pass and the effect of various friction coefficient values has been observed.
Resumo:
Poor health and injury represent major obstacles to the future economic security of Australia. The national economic cost of work-related injury is estimated at $57.5 billion p/a. Since exposure to high physical demands is a major risk factor for musculoskeletal injury, monitoring and managing such physical activity levels in workers is a potentially important injury prevention strategy. Current injury monitoring practices are inadequate for the provision of clinically valuable information about the tissue specific responses to physical exertion. Injury of various soft tissue structures can manifest over time through accumulation of micro-trauma. Such micro-trauma has a propensity to increase the risk of acute injuries to soft-tissue structures such as muscle or tendon. As such, the capacity to monitor biomarkers that result from the disruption of these tissues offers a means of assisting the pre-emptive management of subclinical injury prior to acute failure or for evaluation of recovery processes. Here we have adopted an in-vivo exercise induced muscle damage model allowing the application of laboratory controlled conditions to assist in uncovering biochemical indicators associated with soft-tissue trauma and recovery. Importantly, urine was utilised as the diagnostic medium since it is non-invasive to collect, more acceptable to workers and less costly to employers. Moreover, it is our hypothesis that exercise induced tissue degradation products enter the circulation and are subsequently filtered by the kidney and pass through to the urine. To test this hypothesis a range of metabolomic and proteomic discovery-phase techniques were used, along with targeted approaches. Several small molecules relating to tissue damage were identified along with a series of skeletal muscle-specific protein fragments resulting from exercise induced soft-tissue damage. Each of the potential biomolecular markers appeared to be temporally present within urine. Moreover, the regulation of abundance seemed to be associated with functional recovery following the injury. This discovery may have important clinical applications for monitoring of a variety of inflammatory myopathies as well as novel applications in monitoring of the musculoskeletal health status of workers, professional athletes and/or military personnel to reduce the onset of potentially debilitating musculoskeletal injuries within these professions.
Resumo:
Double-pass counter flow v-grove collector is considered one of the most efficient solar air-collectors. In this design of the collector, the inlet air initially flows at the top part of the collector and changes direction once it reaches the end of the collector and flows below the collector to the outlet. A mathematical model is developed for this type of collector and simulation is carried out using MATLAB programme. The simulation results were verified with three distinguished research results and it was found that the simulation has the ability to predict the performance of the air collector accurately as proven by the comparison of experimental data with simulation. The difference between the predicted and experimental results is, at maximum, approximately 7% which is within the acceptable limit considering some uncertainties in the input parameter values to allow comparison. A parametric study was performed and it was found that solar radiation, inlet air temperature, flow rate and length has a significant effect on the efficiency of the air collector. Additionally, the results are compared with single flow V-groove collector.
Resumo:
Gifts have intrigued and challenged scholars ever since interest in the subject was piqued by Marcel Mauss who, in 1925, wrote the book The gift: The form and reason for exchange in archaic societies. Although ethnographic studies of giftgiving have been mostly confined to small-scale communities, scholars have more recently turned their attention to industrial societies, with studies of Christmas giving, Japanese gift-giving, etc. Now, as studies of consumption are entering a phase of efflorescence, it is time to re-evaluate gift-giving. The recent rapid expansion in the transnational flow of people, objects and ideas has had an impact on the social conditions associated with new global patterns of consumption. In this atmosphere of overlapping cultural, economic and political worlds, there is a need to look again at the objects that pass between us as gifts...
Resumo:
The Bus Rapid Transit (BRT) station is the interface between passengers and services. The station is crucial to line operation as it is typically the only location where buses can pass each other. Congestion may occur here when buses maneuvering into and out of the platform lane interfere with bus flow, or when a queue of buses forms upstream of the platform lane blocking the passing lane. Further, some systems include operation where express buses do not observe the station, resulting in a proportion of non-stopping buses. It is important to understand the operation of the station under this type of operation and its effect on BRT line capacity. This study uses microscopic traffic simulation modeling to treat the BRT station operation and to analyze the relationship between station bus capacity and BRT line bus capacity. First, the simulation model is developed for the limit state scenario and then a statistical model is defined and calibrated for a specified range of controlled scenarios of dwell time characteristics. A field survey was conducted to verify the parameters such as dwell time, clearance time and coefficient of variation of dwell time to obtain relevant station bus capacity. The proposed model for BRT bus capacity provides a better understanding of BRT line capacity and is useful to transit authorities in BRT planning, design and operation.
Resumo:
Speaker attribution is the task of annotating a spoken audio archive based on speaker identities. This can be achieved using speaker diarization and speaker linking. In our previous work, we proposed an efficient attribution system, using complete-linkage clustering, for conducting attribution of large sets of two-speaker telephone data. In this paper, we build on our proposed approach to achieve a robust system, applicable to multiple recording domains. To do this, we first extend the diarization module of our system to accommodate multi-speaker (>2) recordings. We achieve this through using a robust cross-likelihood ratio (CLR) threshold stopping criterion for clustering, as opposed to the original stopping criterion of two speakers used for telephone data. We evaluate this baseline diarization module across a dataset of Australian broadcast news recordings, showing a significant lack of diarization accuracy without previous knowledge of the true number of speakers within a recording. We thus propose applying an additional pass of complete-linkage clustering to the diarization module, demonstrating an absolute improvement of 20% in diarization error rate (DER). We then evaluate our proposed multi-domain attribution system across the broadcast news data, demonstrating achievable attribution error rates (AER) as low as 17%.
Resumo:
Non-periodic structural variation has been found in the high Tc cuprates, YBa2Cu3O7-x and Hg0.67Pb0.33Ba2Ca2Cu 3O8+δ, by image analysis of high resolution transmission electron microscope (HRTEM) images. We use two methods for analysis of the HRTEM images. The first method is a means for measuring the bending of lattice fringes at twin planes. The second method is a low-pass filter technique which enhances information contained by diffuse-scattered electrons and reveals what appears to be an interference effect between domains of differing lattice parameter in the top and bottom of the thin foil. We believe that these methods of image analysis could be usefully applied to the many thousands of HRTEM images that have been collected by other workers in the high temperature superconductor field. This work provides direct structural evidence for phase separation in high Tc cuprates, and gives support to recent stripes models that have been proposed to explain various angle resolved photoelectron spectroscopy and nuclear magnetic resonance data. We believe that the structural variation is a response to an opening of an electronic solubility gap where holes are not uniformly distributed in the material but are confined to metallic stripes. Optimum doping may occur as a consequence of the diffuse boundaries between stripes which arise from spinodal decomposition. Theoretical ideas about the high Tc cuprates which treat the cuprates as homogeneous may need to be modified in order to take account of this type of structural variation.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
In some parts of Australia, people wanting to learn to ride a motorcycle are required to complete an off-road training course before they are allowed to practice on the road. In the state of Queensland, they are only required to pass a short multiple-choice road rules knowledge test. This paper describes an analysis of police-reported crashes involving learner riders in Queensland that was undertaken as part of research investigating whether pre-learner training is needed and, if so, the issues that should be addressed in training.. The crashes of learner riders and other riders were compared to identify whether there are particular situations or locations in which learner motorcyclists are over-involved in crashes, which could then be targeted in the pre-learner package. The analyses were undertaken separately for riders aged under 25 (330 crashes) versus those aged 25 and over (237 crashes) to provide some insight into whether age or riding inexperience are the more important factors, and thus to indicate whether there are merits in having different licensing or training approaches for younger and older learner riders. Given that the average age of learner riders was 33 years, under 25 was chosen to provide a sufficiently large sample of younger riders. Learner riders appeared to be involved in more severe crashes and to be more often at fault than fully-licensed riders but this may reflect problems in reporting, rather than real differences. Compared to open licence holders, both younger and older learner riders had relatively more crashes in low speed zones and relatively fewer in high speed zones. Riders aged under 25 had elevated percentages of night-time crashes and fewer single unit (potentially involving rider error only) crashes regardless of the type of licence held. The contributing factors that were more prevalent in crashes of learner riders than holders of open licences were: inexperience (37.2% versus 0.5%), inattention (21.5% versus 15.6%), alcohol or drugs (12.0% versus 5.1%) and drink riding (9.9% versus 3.1%). The pattern of contributing factors was generally similar for younger and older learner riders, although younger learners were (not surprisingly) more likely to have inexperience coded as a contributing factor (49.7% versus 19.8%). Some of the differences in crashes between learner riders and fully-licensed riders appear to reflect relatively more riding in urban areas by learners, rather than increased risks relating to inexperience. The analysis of contributing factors in learner rider crashes suggests that hazard perception and risk management (in terms of speed and alcohol and drugs) should be included in a pre-learner program. Currently, most learner riders in Queensland complete pre-licence training and become licensed within one month of obtaining their learner permit. If the introduction of pre-learner training required that the learner permit was held for a minimum duration, then the immediate effect might be more learners riding (and crashing). Thus, it is important to consider how training and licensing initiatives work together in order to improve the safety of new riders (and how this can be evaluated).
Resumo:
The utility of a novel technique for determining the ignition delay in a compression ignition engine has been shown. This method utilises statistical modelling in the Bayesian paradigm to accurately resolve the start of combustion from a band-pass in-cylinder pressure signal. Applied to neat diesel and six biofuels, including four fractionations of palm oil of varying carbon chain length and degree of unsaturation, the relationships between ignition delay, cetane number and oxygen content have been explored. It is noted that the expected negative relationship between ignition delay and cetane number held, as did the positive relationship between ignition delay and oxygen content. The degree of unsaturation was also identified as a potential factor influencing the ignition delay.