116 resultados para safe deposit box

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The finite element and boundary element methods are employed in this study to investigate the sound radiation characteristics of a box-type structure. It has been shown [T.R. Lin, J. Pan, Vibration characteristics of a box-type structure, Journal of Vibration and Acoustics, Transactions of ASME 131 (2009) 031004-1–031004-9] that modes of natural vibration of a box-type structure can be classified into six groups according to the symmetry properties of the three panel pairs forming the box. In this paper, we demonstrate that such properties also reveal information about sound radiation effectiveness of each group of modes. The changes of radiation efficiencies and directivity patterns with the wavenumber ratio (the ratio between the acoustic and the plate bending wavenumbers) are examined for typical modes from each group. Similar characteristics of modal radiation efficiencies between a box structure and a corresponding simply supported panel are observed. The change of sound radiation patterns as a function of the wavenumber ratio is also illustrated. It is found that the sound radiation directivity of each box mode can be correlated to that of elementary sound sources (monopole, dipole, etc.) at frequencies well below the critical frequency of the plates of the box. The sound radiation pattern on the box surface also closely related to the vibration amplitude distribution of the box structure at frequencies above the critical frequency. In the medium frequency range, the radiated sound field is dominated by the edge vibration pattern of the box. The radiation efficiency of all box modes reaches a peak at frequencies above the critical frequency, and gradually approaches unity at higher frequencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2008 Tactical Tech published 'Mobiles in-a-box': a toolkit designed to help human rights organisations and advocates use mobile technology in their work in Africa. This chapter reflects on the participatory development process used to develop the toolkit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Professional prac− tice guidelines for endoscope reprocessing re− commend reprocessing endoscopes between each case and proper storage following repro− cessing after the last case of the list. There is lim− ited empirical evidence to support the efficacy of endoscope reprocessing prior to use in the first case of the day; however, internationally, many guidelines continue to recommend this practice. The aim of this study is to estimate a safe shelf life for flexible endoscopes in a high−turnover gastroenterology unit. Materials and methods: In a prospective obser− vational study, all flexible endoscopes in active service during the 3−week study period were mi− crobiologically sampled prior to reprocessing be− fore the first case of the day (n = 200). The main outcome variables were culture status, organism cultured, and shelf life. Results: Among the total number of useable samples (n = 194), the overall contamination rate was 15.5 %, with a pathogenic contamination rate of 0.5 %. Mean time between last case one day and reprocessing before the first case on the next day (that is, shelf life) was 37.62 h (SD 36.47). Median shelf life was 18.8 h (range 5.27± 165.35 h). The most frequently identified organ− ism was coagulase−negative Staphylococcus, an environmental nonpathogenic organism. Conclusions: When processed according to es− tablished guidelines, flexible endoscopes remain free from pathogenic organisms between last case and next day first case use. Significant re− ductions in the expenditure of time and resources on reprocessing endoscopes have the potential to reduce the restraints experienced by high−turnover endoscopy units and improve ser− vice delivery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children with early and continuously treated phenylketonuria (ECT-PKU) remain at risk of developing executive function (EF) deficits. There is some evidence that a high phenylalanine to tyrosine ratio (phe:tyr) is more strongly associated with impaired EF development than high phenylalanine alone. This study examined EF in a sample of 11 adolescents against concurrent and historical levels of phenylalanine, phe:tyr, and tyrosine. Lifetime measures of phe:tyr were more strongly associated with EF than phenylalanine-only measures. Children with a lifetime phe:tyr less than 6 demonstrated normal EF, whereas children who had a lifetime phe:tyr above 6, on average, demonstrated clinically impaired EF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the role of powerful entities and coalitions in shaping international accounting standards. Specifically, the focus is on the process by which the International Accounting Standards Board (IASB) developed IFRS 6, Exploration for and Evaluation of Mineral Resources. In its Issues Paper, the IASB recommended that the successful efforts method be mandated for pre-production costs, eliminating the choice previously available between full cost and successful efforts methods. In spite of the endorsement of this view by a majority of the constituents who responded to the Issues Paper, the final outcome changed nothing, with choice being retained. A compelling explanation of this disparity between the visible inputs and outputs of the standard setting process is the existence of a “black box”, in which powerful extractive industries entities and coalitions covertly influenced the IASB to secure their own ends and ensure that the status quo was maintained

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data breach notification laws require organisations to notify affected persons or regulatory authorities when an unauthorised acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data has been encrypted. There are three types of safe harbour: an exemption; a rebuttable presumption and factor-based analysis. We demonstrate, using three condition-based scenarios, that the broad formulation of most encryption safe harbours is based on the flawed assumption that encryption is the silver bullet for personal information protection. We then contend that reliance upon an encryption safe harbour should be dependent upon a rigorous and competent risk-based review that is required on a case-by-case basis. Finally, we recommend the use of both an encryption safe harbour and a notification trigger as our preferred choice for a data breach notification regulatory framework.

Relevância:

20.00% 20.00%

Publicador: