142 resultados para Casaubon, Juan Alfredo, 1919-2010

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The application of variable structure control (VSC) for power systems stabilization is studied in this paper. It is the application, aspects and constraints of VSC which are of particular interest. A variable structure control methodology has been proposed for power systems stabilization. The method is implemented using thyristor controlled series compensators. A three machine power system is stabilized using a switching line control for large disturbances which becomes a sliding control as the disturbance becomes smaller. The results demonstrate the effectiveness of the methodology proposed as an useful tool to suppress the oscillations in power systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We introduce the use of Ingenuity Pathway Analysis to analyzing global metabonomics in order to characterize phenotypically biochemical perturbations and the potential mechanisms of the gentamicin-induced toxicity in multiple organs. A single dose of gentamicin was administered to Sprague Dawley rats (200 mg/kg, n = 6) and urine samples were collected at -24-0 h pre-dosage, 0-24, 24-48, 48-72 and 72-96 h post-dosage of gentamicin. The urine metabonomics analysis was performed by UPLC/MS, and the mass spectra signals of the detected metabolites were systematically deconvoluted and analyzed by pattern recognition analyses (Heatmap, PCA and PLS-DA), revealing a time-dependency of the biochemical perturbations induced by gentamicin toxicity. As result, the holistic metabolome change induced by gentamicin toxicity in the animal's organisms was characterized. Several metabolites involved in amino acid metabolism were identified in urine, and it was confirmed that gentamicin biochemical perturbations can be foreseen from these biomarkers. Notoriously, it was found that gentamicin induced toxicity in multiple organs system in the laboratory rats. The proof-of-knowledge based Ingenuity Pathway Analysis revealed gentamicin induced liver and heart toxicity, along with the previously known toxicity in kidney. The metabolites creatine, nicotinic acid, prostaglandin E2, and cholic acid were identified and validated as phenotypic biomarkers of gentamicin induced toxicity. Altogether, the significance of the use of metabonomics analyses in the assessment of drug toxicity is highlighted once more; furthermore, this work demonstrated the powerful predictive potential of the Ingenuity Pathway Analysis to study of drug toxicity and its valuable complementation for metabonomics based assessment of the drug toxicity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fair Work Australia is to provide the institutional framework for the Australian industrial relations system from January 2010. Its creation provides the opportunity to improve minimum labour standards’ enforcement in Australia. However, the experience of the past must be appreciated and traditional assumptions about the operation of the Australian enforcement system discarded if the new institution is to be effective in its role. This paper focuses on the role of unions in enforcement as well as institutional location issues to expose a number of central enforcement problems that those seeking to establish new systems and processes should consider. A number of recommendations in respect of the structure of Fair Work Australia and the continuing role of unions are suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuring the correctness of synthetic scenes generated by a rendering system of a 3D application, such as a computer game. Our approach builds a database of labelled point clouds representing the spatiotemporal colour distribution for the objects present in a sequence of bug-free frames. This is done by converting the position that the pixels take over time into the 3D equivalent points with associated colours. Once the space of labelled points is built, each new image produced from the same game by any rendering system can be analysed by measuring its visual inconsistency in terms of distance from the database. Objects within the scene can be relocated (manually or by the application engine); yet the algorithm is able to perform the image analysis in terms of the 3D structure and colour distribution of samples on the surface of the object. We applied our framework to the publicly available game RacingGame developed for Microsoft(R) Xna(R). Preliminary results show how this approach can be used to detect a variety of visual artifacts generated by the rendering system in a professional quality game engine.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Management and staff of the spatial science program at QUT. Student numbers discussion, Alumni News, Staff and Laboratories moving, Work Integrated Learning in 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Has the GFC really changed the thinking of the property industry? Or are investment managers suffering from post-GFC stress disorder fated to repeat the mistakes of the past? Christine Retschlag reports on the mindset of the market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys used between times t1 and t2. In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.’s scheme, and Nilsson et al.’s scheme is given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This collaborative event was organised to coincide with International celebrations by the International Council of Societies of Industrial Design (ICSID). The panel discussion involved industrial designers from a variety of backgrounds including academics, theorists and practitioners. Each panel member was given time to voice their opinion surrounding the theme of WIDD2010 "Industrial Design: Humane Solutions for a Resilient World". The discussion was then extended to the audience through active question and answer time. The panel included: * Professor Vesna Popovic FDIA - Queensland University of Technology * Adam Doyle, Studio Manager - Infinity Design Development * Scott Cox MDIA, Creative Director - Formwerx * Alexander Lotersztain, Director - Derlot * Philip Whiting FDIA, Design Convenor - QCA * Professor Tony Fry, Director Team D/E/S & QCA After this, the documentary by Gary Hewtsit "Objectified" was then screened (75 min).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 2010 Native American Indigenous Studies Conference was held at The Westin La Paloma Resort, Tucson, Arizona, USA from 20-22 May. The conference was scholarly and interdisciplinary and intended for Indigenous and non-Indigenous scholars who work in American Indian/ Native American/ First Nations/ Aboriginal/ Indigenous Studies. The 2010 gathering attracted 768 registrations from the USA, Canada, Hawaii, Mexico, New Zealand and Australia and other countries. This paper is a personal reflection and overview of the 2010 Conference.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A voglite mineral sample of Volrite Canyon #1 mine, Frey Point, White Canyon Mine District, San Juan County, Utah, USA is used in the present study. An EPR study on powdered sample confirms the presence of Mn(II) and Cu(II). Optical absorption spectral results are due to Cu(II) which is in distorted octahedron. NIR results are indicating the presence of water fundamentals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Program. Talkin with Tiga Bayles, 98.9 AM National Indigenous Radio Service (NIRS), 9.00-10.00am, Wednesday 21 July 2010. (1 hour program).----- Bronwyn Fredericks discssed the National Aboriginal and Torres Strait Islander Women’s Health Strategy was launched at the Australian Women’s Health Network (AWHN) National Conference in Hobart on the 19 May 2010. Within this radio interview the background of the Strategy is discussed, funding, who did the consultations and the writing. In the interview Bronwyn Fredericks outlines the process of the Strategy’s development and its uses for the future.----- It is important to note that this Strategy does not replace other national or State and Territory documents which identify priorities and needs. The aim is to supplement existing work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Miller’s algorithm for computing pairings involves perform- ing multiplications between elements that belong to different finite fields. Namely, elements in the full extension field Fpk are multiplied by elements contained in proper subfields F pk/d , and by elements in the base field Fp . We show that significant speedups in pairing computations can be achieved by delaying these “mismatched” multiplications for an optimal number of iterations. Importantly, we show that our technique can be easily integrated into traditional pairing algorithms; implementers can exploit the computational savings herein by applying only minor changes to existing pairing code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.