167 resultados para Rumen fill
Resumo:
A graph theoretic approach is developed for accurately computing haulage costs in earthwork projects. This is vital as haulage is a predominant factor in the real cost of earthworks. A variety of metrics can be used in our approach, but a fuel consumption proxy is recommended. This approach is novel as it considers the constantly changing terrain that results from cutting and filling activities and replaces inaccurate “static” calculations that have been used previously. The approach is also capable of efficiently correcting the violation of top down cutting and bottom up filling conditions that can be found in existing earthwork assignments and sequences. This approach assumes that the project site is partitioned into uniform blocks. A directed graph is then utilised to describe the terrain surface. This digraph is altered after each cut and fill, in order to reflect the true state of the terrain. A shortest path algorithm is successively applied to calculate the cost of each haul and these costs are summed to provide a total cost of haulage
A methodology to develop an urban transport disadvantage framework : the case of Brisbane, Australia
Resumo:
Most individuals travel in order to participate in a network of activities which are important for attaining a good standard of living. Because such activities are commonly widely dispersed and not located locally, regular access to a vehicle is important to avoid exclusion. However, planning transport system provisions that can engage members of society in an acceptable degree of activity participation remains a great challenge. The main challenges in most cities of the world are due to significant population growth and rapid urbanisation which produces increased demand for transport. Keeping pace with these challenges in most urban areas is difficult due to the widening gap between supply and demand for transport systems which places the urban population at a transport disadvantage. The key element in mitigating the issue of urban transport disadvantage is to accurately identify the urban transport disadvantaged. Although wide-ranging variables and multi-dimensional methods have been used to identify this group, variables are commonly selected using ad-hoc techniques and unsound methods. This poses questions of whether the current variables used are accurately linked with urban transport disadvantage, and the effectiveness of the current policies. To fill these gaps, the research conducted for this thesis develops an operational urban transport disadvantage framework (UTDAF) based on key statistical urban transport disadvantage variables to accurately identify the urban transport disadvantaged. The thesis develops a methodology based on qualitative and quantitative statistical approaches to develop an urban transport disadvantage framework designed to accurately identify urban transport disadvantage. The reliability and the applicability of the methodology developed is the prime concern rather than the accuracy of the estimations. Relevant concepts that impact on urban transport disadvantage identification and measurement and a wide range of urban transport disadvantage variables were identified through a review of the existing literature. Based on the reviews, a conceptual urban transport disadvantage framework was developed based on the causal theory. Variables identified during the literature review were selected and consolidated based on the recommendations of international and local experts during the Delphi study. Following the literature review, the conceptual urban transport disadvantage framework was statistically assessed to identify key variables. Using the statistical outputs, the key variables were weighted and aggregated to form the UTDAF. Before the variable's weights were finalised, they were adjusted based on results of correlation analysis between elements forming the framework to improve the framework's accuracy. The UTDAF was then applied to three contextual conditions to determine the framework's effectiveness in identifying urban transport disadvantage. The development of the framework is likely to be a robust application measure for policy makers to justify infrastructure investments and to generate awareness about the issue of urban transport disadvantage.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.
Resumo:
The relationship between Heritage Language and ethnic identity has gained significant research ground in social psychological and poststructural scholarship, with empirical evidence largely emerging from the North American settings. There is little pertinent sociological work conducted outside North America. To fill this gap, this sociological study sets its scene in an Australian context. Drawing on Bourdieu’s notion of habitus, the study examines the contribution of Chinese Australians’ Chineseness to their Chinese Heritage Language proficiency. Two hundred and thirty young Chinese Australians completed the online survey. Results from multiple regression indicate that habitus of Chineseness is one of the significant predictors for the Chinese Heritage Language proficiency of these young people. The study makes a theoretical contribution to investigate ethnic identity – Heritage Language link through the notion of habitus and makes a methodological contribution to quantify this habitus.
Resumo:
We examined whether the use of trabecular metal wedges to fill segmental defects is an effective method of socket reconstruction when used in combination with impaction grafting and implantation of a cemented socket. Fifteen hips in 14 patients underwent impaction grafting in combination with a TM wedge with a minimum of 2 years follow-up. All patients had their defects assessed using the Paprosky classification. Patients were reviewed with x-rays and migration of the implant was measured. Outcome scores were also collected. Mean follow-up was 39 months (25-83). The mean age at surgery was 67.8 (49-85) years. Seven of the patients had previously undergone impaction grafting with the use of a stainless steel rim mesh to constrain the graft. None of the patients had failed either clinically or radiologically.
Resumo:
This is the first volume in a book series examining how organizations in the creative industries respond to disruptive change and how they themselves generate business innovations. The aspiration of this book series is to understand some of the common forces behind the disruptions occurring in so many creative industries today and identifying the most promising strategies and responses by organizations to create new value propositions, business models and business practices that can enable these industry participants to cope with and eventually thrive as their industries and sectors are transformed. The chapters included in the volume examine the processes of disruption and transformation due to the technology of the Internet, social forces driven by social media, the development of new portable digital devices with greater capabilities and smaller size, the decreasing costs of new information, and the creation of new business models and forms of intellectual property ownership rights for a digitized industry. The context for this volume is the publishing industries, understood as the industries for the publishing of fiction and non-fiction books, academic literature, consumer as well as trade magazines, and daily newspapers. This volume includes chapters by an internationally diverse array of media scholars whose chapters provide insights into these phenomena in Eastern Europe, Finland, France, Germany, Norway, Portugal, Russia, and the United States, using different methodological frameworks including, but not limited to, surveys, in-depth interviews and multiple-case studies. One gap that this book series seeks to fill is that between the study of business innovation and disruption by innovation scholars largely based in business school settings and similar studies by scholarly experts from non-business school disciplines, including the broader social sciences (e.g. sociology, political science, economic geography) and creative industry based professional school disciplines (e.g. architecture, communications, design, film making, journalism, media studies, performing arts, photography and television). Future volumes of this book series will examine disruption and business innovation in the film, video and photography sectors (volume two), the music sector (volume three) and interactive entertainment (volume four), with subsequent volumes focusing on the most relevant developments in creative industry business innovation and disruption that emerge.
Resumo:
A number of recent developments in the United State (US), United Kingdom (UK) and Australia suggest that conditions may be ripe for a political shift in the reliance on escalating rates of imprisonment as a default criminal justice strategy for responding to crime. The default position is illustrated by the Yabsleyite response of former New South Wales (NSW) Premier Nathan Rees’s to questioning over the cost of prison building and NSW’s high recidivism rate: ‘[t]he advice to me is we have still got 500 cells empty, I don't mind if we fill them up, and if we fill them up and have to build another jail, we'll build another jail’ (Knox and Tadros 2008)...
Resumo:
Introduction The demand for better integration between primary and secondary healthcare frequently leads to discussion about expanded scope of practice for nursing, paramedic and allied health professionals and the role these clinicians could play in facilitating improved access to timely and appropriate healthcare. From workforce perspective, expanded scope of practice has also been advocated as a mean of fostering workforce retention. Models of expanded scope roles in nursing and paramedicine have been trialled nationally and internationally in both acute and community care settings. Where they have been successful, trials have resulted in reduction in hospital presentation and admission; improved patient access and timeliness; and patient satisfaction. This paper will examine the characteristics of successful expanded scope programs. Method Exploratory case-study analysis of successful integration of expanded health care roles across primary healthcare settings in rural Australia. Results & Conclusions One size does not fill all. Successful models of integrated expanded health care roles in primary health care settings are built on stakeholder’s capacity and preference; community need; and political will. Collaborative, congruent, multi-disciplinary care teams that prioritise patient-centred care within a dynamic primary care setting have merit and are more likely to foster flexibility and sustainability.
Resumo:
An important aspect of decision support systems involves applying sophisticated and flexible statistical models to real datasets and communicating these results to decision makers in interpretable ways. An important class of problem is the modelling of incidence such as fire, disease etc. Models of incidence known as point processes or Cox processes are particularly challenging as they are ‘doubly stochastic’ i.e. obtaining the probability mass function of incidents requires two integrals to be evaluated. Existing approaches to the problem either use simple models that obtain predictions using plug-in point estimates and do not distinguish between Cox processes and density estimation but do use sophisticated 3D visualization for interpretation. Alternatively other work employs sophisticated non-parametric Bayesian Cox process models, but do not use visualization to render interpretable complex spatial temporal forecasts. The contribution here is to fill this gap by inferring predictive distributions of Gaussian-log Cox processes and rendering them using state of the art 3D visualization techniques. This requires performing inference on an approximation of the model on a discretized grid of large scale and adapting an existing spatial-diurnal kernel to the log Gaussian Cox process context.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
A salient but rarely explicitly studied characteristic of interfirm relationships is that they can intentionally be formed for finite periods of time. What determines firms' intertemporal choices between different alliance time horizons? Shadow of the future theorists suggest that when an alliance has an explicitly set short-term time frame, there is an increased risk that partners may behave opportunistically. This does not readily explain the high incidence of time-bound alliances being formed. Reconciling insights from the shadow of the future perspective with nascent research on the flexibility of temporary organizations, and shifting the focus from the level of individual transactions to that of strategic alliance portfolios, we argue that firms may be willing to accept a higher risk of opportunism when there are offsetting gains in strategic flexibility in managing their strategic alliance portfolio. Consequently, we hypothesize that environmental factors that increase the need for strategic flexibility—namely, dynamism and complexity in the environment—are likely to increase the relative share of time-bound alliances in strategic alliance portfolios. Our analysis of longitudinal data on the intertemporal alliance choices of a large sample of small and medium-sized enterprises provides support for this argument. Our findings fill an important gap in theory about time horizons in interfirm relationships and temporary organizations and show the importance of separating planned terminations from duration-based performance measures.
Resumo:
This work was focused on studies of the metal hydride materials having a potential in building hydrogen storage systems with high gravimetric and volumetric efficiencies of H storage and formed / decomposed with high rates of hydrogen exchange. In situ diffraction studies of the metal-hydrogen systems were explored as a valuable tool in probing both the mechanism of the phase-structural transformations and their kinetics. Two complementary techniques, namely Neutron Powder Diffraction (NPD) and Synchrotron X-ray diffraction (SR XRD) were utilised. High pressure in situ NPD studies were performed at D2 pressures reaching 1000 bar at the D1B diffractometer accommodated at Institute Laue Langevin, Grenoble. The data of the time resolved in situ SR XRD were collected at the Swiss Norwegian Beam Lines, ESRF, Grenoble in the pressure range up to 50 bar H2 at temperatures 20-400°C. The systems studied by NPD at high pressures included deuterated Al-modified Laves-type C15 ZrFe2-xAlx intermetallics with x = 0.02; 0.04 and 0.20 and the CeNi5-D2 system. D content, hysteresis of H uptake and release, unit cell expansion and stability of the hydrides systematically change with Al content. Deuteration exhibited a very fast kinetics; it resulted in increase of the unit cells volumes reaching 23.5 % for ZrFe1.98Al0.02D2.9(1) and associated with exclusive occupancy of the Zr2(Fe,Al)2 tetrahedra. For CeNi5 deuteration yielded a hexahydride CeNi5D6.2 (20°C, 776 bar D2) and was accompanied by a nearly isotropic volume expansion reaching 30.1% (∆a/a=10.0%; ∆c/c=7.5%). Deuterium atoms fill three different interstitial sites including Ce2Ni2, Ce2Ni3 and Ni4. Significant hysteresis was observed on the first absorption-desorption cycle. This hysteresis decreased on the absorption-desorption cycling. A different approach to the development of H storage systems is based on the hydrides of light elements, first of all the Mg-based ones. These systems were studied by SR XRD. Reactive ball milling in hydrogen (HRBM) allowed synthesis of the nanostructured Mg-based hydrides. The experimental parameters (PH2, T, energy of milling, ball / sample ratio and balls size), significantly influence rate of hydrogenation. The studies confirmed (a) a completeness of hydrogenation of Mg into MgH2; (b) indicated a partial transformation of the originally formed -MgH2 into a metastable -MgH2 (a ratio / was 3/1); (c) yielded the crystallite size for the main hydrogenation product, -MgH2, as close to 10 nm. Influence of the additives to Mg on the structure and hydrogen absorption/desorption properties and cycle behaviour of the composites was established and will be discussed in the paper.
Resumo:
Planning techniques for large scale earthworks have been considered in this article. To improve these activities a “block theoretic” approach was developed that provides an integrated solution consisting of an allocation of cuts to fills and a sequence of cuts and fills over time. It considers the constantly changing terrain by computing haulage routes dynamically. Consequently more realistic haulage costs are used in the decision making process. A digraph is utilised to describe the terrain surface which has been partitioned into uniform grids. It reflects the true state of the terrain, and is altered after each cut and fill. A shortest path algorithm is successively applied to calculate the cost of each haul, and these costs are summed over the entire sequence, to provide a total cost of haulage. To solve this integrated optimisation problem a variety of solution techniques were applied, including constructive algorithms, meta-heuristics and parallel programming. The extensive numerical investigations have successfully shown the applicability of our approach to real sized earthwork problems.
Resumo:
This study investigated the effect of a calcium phosphate (CaP) coating onto a polycaprolactone melt electrospun scaffold and in vitro culture conditions on ectopic bone formation in a subcutaneous rat model. The CaP coating resulted in an increased alkaline phosphatase activity (ALP) in ovine osteoblasts regardless of the culture conditions and this was also translated into higher levels of mineralisation. A subcutaneous implantation was performed and increasing ectopic bone formation was observed over time for the CaPcoated samples previously cultured in osteogenic media whereas the corresponding non-coated samples displayed a lag phase before bone formation occurred from 4 to 8 weeks post-implantation. Histology and immunohistochemistry revealed bone fill through the scaffolds 8 weeks post-implantation for coated and non-coated specimens and that ALP, osteocalcin and collagen 1 were present at the ossification front and in the bone tissues. Vascularisation in the vicinity of the bone tissues was also observed indicating that the newly formed bone was not deprived of oxygen and nutrients.We found that in vitro osteogenic induction was essential for achieving bone formation and CaP coating accelerated the osteogenic process. We conclude that high cell density and preservation of the collagenous and mineralised extracellular matrix secreted in vitro are factors of importance for ectopic bone formation.