395 resultados para small scaled conveyor modules

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Tarsal tunnel syndrome is classified as a focal compressive neuropathy of the posterior tibial nerve or one of its associated branches individually or collectively. The tunnel courses deep to fascia, the flexor retinaculum and within the abductor hallucis muscle of the foot/ankle. The condition is rare and regularly under-diagnosed leading to a range of symptoms affecting the plantar margins of the foot. There are many intervention strategies for treating tarsal tunnel syndrome with limited robust evidence to guide the clinical management of this condition. The role of conservative versus surgical interventions at various stages of the disease process remains unclear, and there is a need for a structured, step-wise approach in treating patients with this syndrome based on derived empirical evidence. This narrative review attempts to scrutinize the literature to date by clarifying initial presentation, investigations and definitive treatment for the purpose of assisting future informed clinical decision and prospective research endeavours. Process The literature searches that have been incorporated in compiling a rigorous review of this condition have included: the Cochrane Neuromuscular Group's Specialized Register (Cochrane Library 2013), the databases of EMBASE, AMED, MEDLINE, CINAHL, Physiotherapy evidence database (PEDRO), Biomed Central, Science Direct and Trip Database (1972 to the present). Reference listings of located articles were also searched and scrutinized. Authors and experts within the field of lower-limb orthopaedics were contacted to discuss applicable data. Subject-specific criteria searches utilizing the following key terms were performed across all databases: tarsal tunnel syndrome, tibial neuralgia, compression neuropathy syndromes, tibial nerve impingement, tarsal tunnel neuropathy, entrapment tibial nerve, posterior tibial neuropathy. These search strategies were modified with differing databases, adopting specific sensitivity-searching tools and functions unique to each. This search strategy identified 88 journal articles of relevance for this narrative literature review. Findings This literature review has appraised the clinical significance of tarsal tunnel syndrome, whilst assessing varied management interventions (non-surgical and surgical) for the treatment of this condition in both adults and children. According to our review, there is limited high-level robust evidence to guide and refine the clinical management of tarsal tunnel syndrome. Requirements for small-scaled randomized controlled trials in groups with homogenous aetiology are needed to analyse the effectiveness of specific treatment modalities. Conclusions It is necessary that further research endeavours be pursued for the clinical understanding, assessment and treatment of tarsal tunnel syndrome. Accordingly, a structured approach to managing patients who have been correctly diagnosed with this condition should be formulated on the basis of empirical evidence where possible.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hydraulic excavators in the mining industry are widely used owing to the large payload capabilities these machines can achieve. However, there are very few optimisation studies for producing efficient hydraulic excavator backets. An efficient bucket can avoid unnecessary weight; greatly influence the payload and optimise the efficiency of hydraulic mining excavators. This paper presents a framework for the development of a scaled hydraulic excavator by examining the geometry and force relationships. A small hydraulic excavator was purchased and fitted with a broom scaled to a factor. Geometric and force relationships of the model were derived to assist computer instrumentation to retrieve necessary variable input for bucket design.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we give an overview of some very recent work, as well as presenting a new approach, on the stochastic simulation of multi-scaled systems involving chemical reactions. In many biological systems (such as genetic regulation and cellular dynamics) there is a mix between small numbers of key regulatory proteins, and medium and large numbers of molecules. In addition, it is important to be able to follow the trajectories of individual molecules by taking proper account of the randomness inherent in such a system. We describe different types of simulation techniques (including the stochastic simulation algorithm, Poisson Runge-Kutta methods and the balanced Euler method) for treating simulations in the three different reaction regimes: slow, medium and fast. We then review some recent techniques on the treatment of coupled slow and fast reactions for stochastic chemical kinetics and present a new approach which couples the three regimes mentioned above. We then apply this approach to a biologically inspired problem involving the expression and activity of LacZ and LacY proteins in E coli, and conclude with a discussion on the significance of this work. (C) 2004 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New residential scale photovoltaic (PV) arrays are commonly connected to the grid by a single dc-ac inverter connected to a series string of pv panels, or many small dc-ac inverters which connect one or two panels directly to the ac grid. This paper proposes an alternative topology of nonisolated per-panel dc-dc converters connected in series to create a high voltage string connected to a simplified dc-ac inverter. This offers the advantages of a "converter-per-panel" approach without the cost or efficiency penalties of individual dc-ac grid connected inverters. Buck, boost, buck-boost, and Cu´k converters are considered as possible dc-dc converters that can be cascaded. Matlab simulations are used to compare the efficiency of each topology as well as evaluating the benefits of increasing cost and complexity. The buck and then boost converters are shown to be the most efficient topologies for a given cost, with the buck best suited for long strings and the boost for short strings. While flexible in voltage ranges, buck-boost, and Cu´k converters are always at an efficiency or alternatively cost disadvantage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New residential scale photovoltaic (PV) arrays are commonly connected to the grid by a single DC-AC inverter connected to a series string of PV modules, or many small DC-AC inverters which connect one or two modules directly to the AC grid. This paper shows that a "converter-per-module" approach offers many advantages including individual module maximum power point tracking, which gives great flexibility in module layout, replacement, and insensitivity to shading; better protection of PV sources, and redundancy in the case of source or converter failure; easier and safer installation and maintenance; and better data gathering. Simple nonisolated per-module DC-DC converters can be series connected to create a high voltage string connected to a simplified DC-AC inverter. These advantages are available without the cost or efficiency penalties of individual DC-AC grid connected inverters. Buck, boost, buck-boost and Cuk converters are possible cascadable converters. The boost converter is best if a significant step up is required, such as with a short string of 12 PV modules. A string of buck converters requires many more modules, but can always deliver any combination of module power. The buck converter is the most efficient topology for a given cost. While flexible in voltage ranges, buck-boost and Cuk converters are always at an efficiency or alternatively cost disadvantage

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the potentially far reaching recommendations of the Senate Inquiry of 2001 was to fund professional development for teachers of gifted children under the Australian Government Quality Teacher Program (AGQTP). This funding was made available to all sectors of schooling and led to a number of initiatives to address the shortcomings in gifted education identified in the Senate Report. This paper reports on the initiatives undertaken by one sector over an eight-year period. The initiative began with a commitment from the sector to provide professional development in gifted education and later required that sector to address gifted education in their school renewal planning. A professional development program was planned and implemented in stages drawing on the AGQTP modules. However, teachers were encouraged to pursue an active role in instigating their own professional development priorities and needs. Thus, teachers within an action research framework collaboratively designed, implemented and reflected on projects which progressively expanded over a three year period. Initial projects focussed on their own teaching or context. In the second year of the three-year-cycle projects expanded to include colleagues. Finally, in the third year teachers assumed a leadership role in their schools or district and mentored other teachers beginning the program. The paper presents both qualitative and quantitative data on the experiences of the participating teachers and the long term impact on the capacity of the jurisdiction to provide enhanced opportunities for gifted children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.