37 resultados para Bucket Seats.

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a method for calculating the in-bucket payload volume on a dragline for the purpose of estimating the material’s bulk density in real-time. Knowledge of the bulk density can provide instant feedback to mine planning and scheduling to improve blasting and in turn provide a more uniform bulk density across the excavation site. Furthermore costs and emissions in dragline operation, maintenance and downstream material processing can be reduced. The main challenge is to determine an accurate position and orientation of the bucket with the constraint of real-time performance. The proposed solution uses a range bearing and tilt sensor to locate and scan the bucket between the lift and dump stages of the dragline cycle. Various scanning strategies are investigated for their benefits in this real-time application. The bucket is segmented from the scene using cluster analysis while the pose of the bucket is calculated using the iterative closest point (ICP) algorithm. Payload points are segmented from the bucket by a fixed distance neighbour clustering method to preserve boundary points and exclude low density clusters introduced by overhead chains and the spreader bar. A height grid is then used to represent the payload from which the volume can be calculated by summing over the grid cells. We show volume calculated on a scaled system with an accuracy of greater than 95 per cent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia’s Future Tax System Review, headed by the then head of the Australian Treasury, and the Productivity Commission’s Research Report on the not for profit sector, both examined the state of tax concessions to Australia’s not for profit sector in the light of the High Court’s decision in Commissioner of Taxation v Word Investments Ltd. Despite being unable to quantify with any certainty the pre- or post-Word Investments cost of the tax concessions, both Reports indicated their support for continuation of the income tax exemption. However, the government acted in the 2011 Budget to target the not for profit income tax concessions more precisely, mainly on competitive neutrality grounds. This article examines the income tax exemption by applying the five taxation design principles, proposed in the Australia’s Future Tax System Review, for assessing tax expenditure. The conclusion is that the exemptions can be justified and, further, that a rationale for the exemption can be consistent with the reasoning in the Word Investments case.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper details the implementation and trialling of a prototype in-bucket bulk density monitor on a production dragline. Bulk density information can provide feedback to mine planning and scheduling to improve blasting and consequently facilitating optimal bucket sizing. The bulk density measurement builds upon outcomes presented in the AMTC2009 paper titled ‘Automatic In-Bucket Volume Estimation for Dragline Operations’ and utilises payload information from a commercial dragline monitor. While the previous paper explains the algorithms and theoretical basis for the system design and scaled model testing this paper will focus on the full scale implementation and the challenges involved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

intimate drowning 50 minute performance + installation work ice | salt | tears | This work is about death. Grief The relationships before The aftermath - of confusion, violence, isolation The never ending questions The devastating loss and paranoia "Since my wife died, I have spent the last six years treading water - trying to stop myself from drowning. Sometimes I catch myself not breathing. I have to remind myself that I can't live underwater no matter how much I want to." Grief. Loss. Tears. Fear. Sadness Water. Milk. Salt. Ice Falling. Waiting Submerged. Suffocated. Broken ties Intention. Lack of focus. Intensity of focus Fighting. Screaming. Wailing Blue. White. Black. Blackness The doors open: we walk through a gauze curtain and discover a dark space with a square of light in the middle of the room. As we walk closer to the light, we see a girl writing in charcoal on the floor around a square box filled with milk. She is writing the same thing over and over. The more she writes the more desperate she becomes: I am listening… We have to keep walking past. She isn’t writing for us. We find our seats Two people: one slowly breaking the hundreds of fragile strings that tie her to the other. The other is pleading with her to stop: Please. Please don’t. Please Avril. …Please don’t One girl facing away from us. She is slowly swimming on the spot without water. Projected next to her are images of her drowning under water. Salt falls in front of her. Behind her. A wall of salt. She is bound to the spot. Underwater and still breathing. Swimming in her own tears. She won’t escape. She wants to stay, but desires nothing Two people standing in a large square box filled with milk. They start in intimacy. The relationship begins to dissolve before us. One fights to be with/on/behind the other. The other fights her off. The milk is splashed. Why aren't they being careful? In the darkness there is scrubbing. Someone is scrubbing the floor. The other girl is on her knees trying to erase the original writing. The traces left behind that we have no control over. We only see her for a second, but hear her in the darkness. Scrubbing. It is pointless. You can't erase the past.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Node-based Local Mesh Generation (NLMG) algorithm, which is free of mesh inconsistency, is one of core algorithms in the Node-based Local Finite Element Method (NLFEM) to achieve the seamless link between mesh generation and stiffness matrix calculation, and the seamless link helps to improve the parallel efficiency of FEM. Furthermore, the key to ensure the efficiency and reliability of NLMG is to determine the candidate satellite-node set of a central node quickly and accurately. This paper develops a Fast Local Search Method based on Uniform Bucket (FLSMUB) and a Fast Local Search Method based on Multilayer Bucket (FLSMMB), and applies them successfully to the decisive problems, i.e. presenting the candidate satellite-node set of any central node in NLMG algorithm. Using FLSMUB or FLSMMB, the NLMG algorithm becomes a practical tool to reduce the parallel computation cost of FEM. Parallel numerical experiments validate that either FLSMUB or FLSMMB is fast, reliable and efficient for their suitable problems and that they are especially effective for computing the large-scale parallel problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research described in this paper is directed toward increasing productivity of draglines through automation. In particular, it focuses on the swing-to-dump, dump, and return-to-dig phases of the dragline operational cycle by developing a swing automation system. In typical operation the dragline boom can be in motion for up to 80% of the total cycle time. This provides considerable scope for improving cycle time through automated or partially automated boom motion control. This paper describes machine vision based sensor technology and control algorithms under development to solve the problem of continuous real time bucket location and control. Incorporation of this capability into existing dragline control systems will then enable true automation of dragline swing and dump operations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes automation of the digging cycle of a mining rope shovel which considers autonomous dipper (bucket) filling and determining methods to detect when to disengage the dipper from the bank. Novel techniques to overcome dipper stall and the online estimation of dipper "fullness" are described with in-field experimental results of laser DTM generation, machine automation and digging using a 1/7th scale model rope shovel presented. © 2006 Wiley Periodicals, Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the feasibility of automation of dragline bucket excavators used to strip over-burden from open cut mines. In particular the automatic control of bucket carry angle and bucket trajectory are addressed. Open-loop dynamics of a 1:20 scale model dragline bucket are identified, through measurement of frequency response between carry angle and drag motor input voltage. A strategy for automatic control of carry angle is devised and implemented using bucket angle and rate feedback. System compensation and tuning are explained and closed loop frequency and time responses are measured.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes automation of the digging cycle of a mining rope shovel which considers autonomous dipper (bucket) filling and determining methods to detect when to disengage the dipper from the bank. Novel techniques to overcome dipper stall and the online estimation of dipper “fullness” are described with in-field experimental results of laser DTM generation, machine automation and digging using a 1/7th scale model rope shovel presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New legislation requires all children 7 years and younger to use child-specific Australian Standards approved restraints suitable to their age and restricts seating young children in the front of cars. Observations of child seating position and restraint use were undertaken in Toowoomba and Rockhampton before the Queensland legislation was announced (T1), after the announcement but before it was enacted (T2) and after it came into force (T3). From T1 to T2, the percentage of children seated in the rear increased (69% to 75%), with a further increase from T2 to T3 (75% to 77%). This pattern was clear when there were one or two children in the car, but not when there were 3 or more. The effect on restraint use was more complex. After the announcement (T2) the percentage of children using adult seatbelts significantly increased regardless of the number of child passengers. However, once the legislation was enacted (T3) there was a significant increase in the percentage of children using child seats/boosters where there was one or two child passengers. Where there were three or more children in the vehicle there was little change in restraint choice between pre (T1) and post (T3) legislation.