107 resultados para VERSION
Resumo:
This paper describes the operation of a microgrid that contains a custom power park (CPP). The park may contain an unbalanced and/or nonlinear load and the microgrid may contain many dis-tributed generators (DGs). One of the DGs in the microgrid is used as a compensator to achieve load compensation. A new method is proposed for current reference generation for load compensation, which takes into account the real and reactive power to be supplied by the DG connected to the compensator. The real and reactive power from the DGs and the utility source is tightly regulated assuming that dedicated communication channels are available. Therefore this scheme is most suitable in cases where the loads in CPP and DGs are physically located close to each other. The proposal is validated through extensive simulation studies using EMTDC/PSCAD software package (version 4.2).
Resumo:
Building on the strengths of its popular previous editions, Management 4th Australasian edition has been thoroughly revised and updated to both reflect contemporarymanagement thinking and to highlight the issues facing managers of the21st century. A solid foundation of theory provides the background to a wealth ofillustrative examples, highlighting organisations operating inAustralia, New Zealand and the Asia-Pacific region. A balance of small-to medium- size enterprises and larger multinational corporations arefeatured. A critical thinking perspective is integrated throughout thebook, asking and encouraging student to analyse research and theory inthe light of contemporary management practice. Each copy of the printed textbook comes with a free copy of the Wiley Desktop Edition:a full electronic version of the text that allows students to easilysearch for key concepts, create their own colour-coded highlights andmake electronic notes in the text for revision. Key themes of the text include: The importance of ethical and socially responsible management Recognition of the continuing need to cater for the increasing diversity of the workforce The importance of managing people, technology, knowledge and quality in achieving organisational goals An appreciation of the challenges and opportunities presented bythe ever changing environment in which contemporary managers operate.
Resumo:
Building on the strengths of its popular previous edition Management: Core Concepts and Applications, 2nd Australasian edition has been thoroughly revised and updated to reflect the three keyaspects of contemporary undergraduate introductory management education: Management theory Concept application Skills development. The text's 16 chapters are presented in a lively and concise mannerideal for the typical 12 or 13 teaching weeks of a semester. Itsflexible framework allows instructors to teach students through the useof interactive tools such as case studies, exercises and projects.These action-oriented learning activities complement the text's solidfoundation of knowledge-based theory material. There is a balanced coverage of both small to medium sizedenterprises and larger multinational organisations operating inAustralia, New Zealand and the Asia-Pacific region. A critical thinkingperspective is integrated throughout the book, asking and encouragingstudents to analyse the theory in light of real-world examples. Each copy of the printed textbook comes with a free copy of the Wiley Desktop Edition:a full electronic version of the text that allows students to easilysearch for key concepts, create their own colour-coded highlights andmake electronic notes in the text for revision. Key themes of the text include: The importance of ethical and socially responsible management Recognition of the continuing need to cater for the increasing diversity of the workforce The importance of managing people, technology, knowledge and quality in achieving organisational goals An appreciation of the challenges and opportunities presented bythe ever changing environment in which contemporary managers operate.
Resumo:
This article reports an enhanced solvent casting/particulate (salt) leaching (SCPL) method developed for preparing three-dimensional porous polyurethane (PU) scaffolds for cardiac tissue engineering. The solvent for the preparation of the PU scaffolds was a mixture of dimethylformamide (DFM) and tetrahydrofuran (THF). The enhanced method involved the combination of a conventional SCPL method and a step of centrifugation, with the centrifugation being employed to improve the pore uniformity and the pore interconnectivity of scaffolds. Highly porous three-dimensional scaffolds with a well interconnected porous structure could be achieved at the polymer solution concentration of up to 20% by air or vacuum drying to remove the solvent. When the salt particle sizes of 212-295, 295-425, or 425-531 µm and a 15% w/v polymer solution concentration were used, the porosity of the scaffolds was between 83-92% and the compression moduli of the scaffolds were between 13 kPa and 28 kPa. Type I collagen acidic solution was introduced into the pores of a PU scaffold to coat the collagen onto the pore walls throughout the whole PU scaffold. The human aortic endothelial cells (HAECs) cultured in the collagen-coated PU scaffold for 2 weeks were observed by scanning electron microscopy (SEM). It was shown that the enhanced SCPL method and the collagen coating resulted in a spatially uniform distribution of cells throughout the collagen-coated PU scaffold.
Resumo:
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.
Resumo:
Transverse spin relaxation rates of water protons in articular cartilage and tendon depend on the orientation of the tissue relative to the applied static magnetic field. This complicates the interpretation of magnetic resonance images of these tissues. At the same time, relaxation data can provide information about their organisation and microstructure. We present a theoretical analysis of the anisotropy of spin relaxation of water protons observed in fully hydrated cartilage. We demonstrate that the anisotropy of transverse relaxation is due almost entirely to intramolecular dipolar coupling modulated by a specific mode of slow molecular motion: the diffusion of water molecules in the hydration shell of a collagen fibre around the fibre, such that the molecular director remains perpendicular to the fibre. The theoretical anisotropy arising from this mechanism follows the “magic-angle” dependence observed in magnetic-resonance measurements of cartilage and tendon and is in good agreement with the available experimental results. We discuss the implications of the theoretical findings for MRI of ordered collagenous tissues.
Resumo:
Jean Anyon’s (1981) “Social class and school knowledge” was a landmark work in North American educational research. It provided a richly detailed qualitative description of differential, social-class-based constructions of knowledge and epistemological stance. This essay situates Anyon’s work in two parallel traditions of critical educational research: the sociology of the curriculum and classroom interaction and discourse analysis. It argues for the renewed importance of both quantitative and qualitative research on social reproduction and equity in the current policy context.
Resumo:
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.
Resumo:
Channel measurements and simulations have been carried out to observe the effects of pedestrian movement on multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) channel capacity. An in-house built MIMO-OFDM packet transmission demonstrator equipped with four transmitters and four receivers has been utilized to perform channel measurements at 5.2 GHz. Variations in the channel capacity dynamic range have been analysed for 1 to 10 pedestrians and different antenna arrays (2 × 2, 3 × 3 and 4 × 4). Results show a predicted 5.5 bits/s/Hz and a measured 1.5 bits/s/Hz increment in the capacity dynamic range with the number of pedestrian and the number of antennas in the transmitter and receiver array.
Resumo:
Inward export activities for services companies have been largely neglected in the literature. Little is known about how professional service firms export to overseas consumers who travel to the domestic market of the firm. This study utilizes a resource-based perspective (RBV) to explore the main barriers and drivers of export performance for professional education services. A case study of Australia’s education industry, as well as interviews with executives from four Australian education institutions, was conducted. Findings show that inward exporters confront most barriers in the domestic market where the service is provided, and drivers of export performance combine firm- and country-specific resources.
Resumo:
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (CSA-SC). Firstly, a new representation of CSA-SC with a state size of only 89 bits is given, a significant reduction from the 103 bit state of a previous CSA-SC representation. Analysis of this 89-bit representation demonstrates that the basis of a previous guess-and-determine attack is flawed. Correcting this flaw increases the complexity of that attack so that it is worse than exhaustive key search. Although that attack is not feasible, the reduced state size of our representation makes it obvious that CSA-SC is vulnerable to several generic attacks, for which feasible parameters are given.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.
Resumo:
Industrial employment growth has been one of the most dynamic areas of expansion in Asia; however, current trends in industrialised working environments have resulted in greater employee stress. Despite research showing that cultural values affect the way people cope with stress, there is a dearth of psychometrically established tools for use in non-Western countries to measure these constructs. Studies of the "Way of Coping Checklist-Revised" (WCCL-R) in the West suggest that the WCCL-R has good psychometric properties, but its applicability in the East is still understudied. A confirmatory factor analysis (CFA) is used to validate the WCCL-R constructs in an Asian population. This study used 1,314 participants from Indonesia, Sri Lanka, Singapore, and Thailand. An initial exploratory factor analysis revealed that original structures were not confirmed; however, a subsequent EFA and CFA showed that a 38-item, five-factor structure model was confirmed. The revised WCCL-R in the Asian sample was also found to have good reliability and sound construct and concurrent validity. The 38-item structure of the WCCL-R has considerable potential in future occupational stress-related research in Asian countries.
Resumo:
Postconcussion symptoms are relatively common in the acute recovery period following mild traumatic brain injury (MTBI). However, for a small subset of patients, self reported postconcussion symptoms continue long after injury. Many factors have been proposed to account for the presence of persistent postconcussion symptoms. The influence of personality traits has been proposed as one explanation. The purpose of this study was to examine the relation between postconcussion-like symptom reporting and personality traits in a sample of 96 healthy participants. Participants completed the British Columbia Postconcussion Symptom Inventory (BC-PSI) and the Millon Clinical Multiaxial Inventory III (MCMI-III). There was a strong positive relation between the majority of MCMI-III scales and postconcussion-like symptom reporting. Approximately half of the sample met the International Classification of Diseases-10 Criterion C symptoms for Postconcussional Syndrome (PCS). Compared with those participants who did not meet this criterion, the PCS group had significant elevations on the negativistic, depression, major depression, dysthymia, anxiety, dependent, sadistic, somatic, and borderline scales of the MCMI-III. These findings support the hypothesis that personality traits can play a contributing role in self reported postconcussion-like symptoms.