10 resultados para Armington Assumption

em CORA - Cork Open Research Archive - University College Cork - Ireland


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the embedded capacitance material (ECM) is fabricated between the power and ground layers of the wireless sensor nodes, forming an integrated capacitance to replace the large amount of decoupling capacitors on the board. The ECM material, whose dielectric constant is 16, has the same size of the wireless sensor nodes of 3cm*3cm, with a thickness of only 14μm. Though the capacitance of a single ECM layer being only around 8nF, there are two reasons the ECM layers can still replace the high frequency decoupling capacitors (100nF in our case) on the board. The first reason is: the parasitic inductance of the ECM layer is much lower than the surface mount capacitors'. A smaller capacitance value of the ECM layer could achieve the same resonant frequency of the surface mount decoupling capacitors. Simulation and measurement fit this assumption well. The second reason is: more than one layer of ECM material are utilized during the design step to get a parallel connection of the several ECM capacitance layers, finally leading to a larger value of the capacitance and smaller value of parasitic. Characterization of the ECM is carried out by the LCR meter. To evaluate the behaviors of the ECM layer, time and frequency domain measurements are performed on the power-bus decoupling of the wireless sensor nodes. Comparison with the measurements of bare PCB board and decoupling capacitors solution are provided to show the improvement of the ECM layer. Measurements show that the implementation of the ECM layer can not only save the space of the surface mount decoupling capacitors, but also provide better power-bus decoupling to the nodes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study is set in the context of disadvantaged urban primary schools in Ireland. It inquires into the collaborative practices of primary teachers exploring how class teachers and support teachers develop ways of working together in an effort to improve the literacy and numeracy levels of their student. Traditionally teachers have worked in isolation and therefore ‘collaboration’ as a practice has been slow to permeate the historically embedded assumption of how a teacher should work. This study aims to answer the following questions. 1). What are the dynamics of teacher collaboration in disadvantaged urban primary schools? 2). In what ways are teacher collaboration and teacher learning related? 3). In what ways does teacher collaboration influence students’ opportunities for learning? In answering these research questions, this study aims to contribute to the body of knowledge pertaining to teacher learning through collaboration. Though current policy and literature advocate and make a case for the development of collaborative teaching practices, key studies have identified gaps in the research literature in relation to the impact of teacher collaboration in schools. This study seeks to address some of those gaps by establishing how schools develop a collaborative environment and how teaching practices are enacted in such a setting. It seeks to determine what skills, relationships, structures and conditions are most important in developing collaborative environments that foster the development of professional learning communities (PLCs). This study uses a mixed method research design involving a postal survey, four snap-shot case studies and one in depth case study in an effort to establish if collaborative practice is a feasible practice resulting in worthwhile benefits for both teachers and students.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this thesis a novel theory of electrocatalysis at metal (especially noble metal)/solution interfaces was developed based on the assumption of metal adatom/incipient hydrous oxide cyclic redox transitions. Adatoms are considered as metastable, low coverage species that oxidise in-situ at potentials of often significantly cathodic to the regular metal/metal oxide transition. Because the adatom coverage is so low the electrochemical or spectroscopic response for oxidation is frequently overlooked; however, the product of such oxidation, referred to here as incipient hydrous oxide seems to be the important mediator in a wide variety of electrocatalytically demanding oxidation processes. Conversely, electrocatalytically demanding reductions apparently occur only at adatom sites at the metal/solution interface - such reactions generally occur only at potentials below, i.e. more cathodic than, the adatom/hydrous oxide transition. It was established that while silver in base oxidises in a regular manner (forming initially OHads species) at potentials above 1.0 V (RHE), there is a minor redox transition at much lower potentials, ca. o.35 v (RHE). The latter process is assumed to an adatom/hydrous oxide transition and the low coverage Ag(l) hydrous oxide (or hydroxide) species was shown to trigger or mediate the oxidation of aldehydes, e. g. HCHO. The results of a study of this system were shown to be in good agreement with a kinetic model based on the above assumptions; the similarity between this type of behaviour and enzyme-catalysed processes - both systems involve interfacial active sites - was pointed out. Similar behaviour was established for gold where both Au(l) and Au(lll) hydrous oxide mediators were shown to be the effective oxidants for different organic species. One of the most active electrocatalytic materials known at the present time is platinum. While the classical view of this high activity is based on the concept of activated chemisorption (and the important role of the latter is not discounted here) a vital role is attributed to the adatom/hydrous oxide transition. It was suggested that the well known intermediate (or anomalous) peak in the hydrogen region of the cyclic voltanmogram for platinum region is in fact due to an adatom/hydrous oxide transition. Using potential stepping procedures to minimise the effect of deactivating (COads) species, it was shown that the onset (anodic sweep) and termination (cathodic sweep) potential for the oxidation of a wide variety of organics coincided with the potential for the intermediate peak. The converse was also shown to apply; sluggish reduction reactions, that involve interaction with metal adatoms, occur at significant rates only in the region below the hydrous oxide/adatom transition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For two multinormal populations with equal covariance matrices the likelihood ratio discriminant function, an alternative allocation rule to the sample linear discriminant function when n1 ≠ n2 ,is studied analytically. With the assumption of a known covariance matrix its distribution is derived and the expectation of its actual and apparent error rates evaluated and compared with those of the sample linear discriminant function. This comparison indicates that the likelihood ratio allocation rule is robust to unequal sample sizes. The quadratic discriminant function is studied, its distribution reviewed and evaluation of its probabilities of misclassification discussed. For known covariance matrices the distribution of the sample quadratic discriminant function is derived. When the known covariance matrices are proportional exact expressions for the expectation of its actual and apparent error rates are obtained and evaluated. The effectiveness of the sample linear discriminant function for this case is also considered. Estimation of true log-odds for two multinormal populations with equal or unequal covariance matrices is studied. The estimative, Bayesian predictive and a kernel method are compared by evaluating their biases and mean square errors. Some algebraic expressions for these quantities are derived. With equal covariance matrices the predictive method is preferable. Where it derives this superiority is investigated by considering its performance for various levels of fixed true log-odds. It is also shown that the predictive method is sensitive to n1 ≠ n2. For unequal but proportional covariance matrices the unbiased estimative method is preferred. Product Normal kernel density estimates are used to give a kernel estimator of true log-odds. The effect of correlation in the variables with product kernels is considered. With equal covariance matrices the kernel and parametric estimators are compared by simulation. For moderately correlated variables and large dimension sizes the product kernel method is a good estimator of true log-odds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An aim of proactive risk management strategies is the timely identification of safety related risks. One way to achieve this is by deploying early warning systems. Early warning systems aim to provide useful information on the presence of potential threats to the system, the level of vulnerability of a system, or both of these, in a timely manner. This information can then be used to take proactive safety measures. The United Nation’s has recommended that any early warning system need to have four essential elements, which are the risk knowledge element, a monitoring and warning service, dissemination and communication and a response capability. This research deals with the risk knowledge element of an early warning system. The risk knowledge element of an early warning system contains models of possible accident scenarios. These accident scenarios are created by using hazard analysis techniques, which are categorised as traditional and contemporary. The assumption in traditional hazard analysis techniques is that accidents are occurred due to a sequence of events, whereas, the assumption of contemporary hazard analysis techniques is that safety is an emergent property of complex systems. The problem is that there is no availability of a software editor which can be used by analysts to create models of accident scenarios based on contemporary hazard analysis techniques and generate computer code that represent the models at the same time. This research aims to enhance the process of generating computer code based on graphical models that associate early warning signs and causal factors to a hazard, based on contemporary hazard analyses techniques. For this purpose, the thesis investigates the use of Domain Specific Modeling (DSM) technologies. The contributions of this thesis is the design and development of a set of three graphical Domain Specific Modeling languages (DSML)s, that when combined together, provide all of the necessary constructs that will enable safety experts and practitioners to conduct hazard and early warning analysis based on a contemporary hazard analysis approach. The languages represent those elements and relations necessary to define accident scenarios and their associated early warning signs. The three DSMLs were incorporated in to a prototype software editor that enables safety scientists and practitioners to create and edit hazard and early warning analysis models in a usable manner and as a result to generate executable code automatically. This research proves that the DSM technologies can be used to develop a set of three DSMLs which can allow user to conduct hazard and early warning analysis in more usable manner. Furthermore, the three DSMLs and their dedicated editor, which are presented in this thesis, may provide a significant enhancement to the process of creating the risk knowledge element of computer based early warning systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Following international trends victims of crime in Ireland have increasingly become a source of political, policy and to a lesser extent academic concern. Although it is assumed that the Irish victims’ rights movement is having a profound impact on the criminal justice system there are very few studies addressing this assumption or the genesis of the Irish movement. At the time a victims’ rights movement was established in Ireland there were movements already established in the U.S. and Britain. To determine which model Ireland followed, if any, in establishing its movement a comparative analysis of the emergence of the victims’ rights movements in these three common law jurisdictions was undertaken. This research examines possible victim policy transfer to test the transfer route perception that the victims’ movement began in the U.S., was transferred into Britain and then onto Ireland. At the same time that the victims’ rights movements were emerging in the U.S., Britain and Ireland, and asserting pressure on their national governments for beneficial changes for victims of crime, international organisations such as the U.N. and Council of Europe were being pressured by victims’ rights groups into introducing victim centered instruments of guidance and best practice for member states. Eventually the E.U. became involved and enacted a binding instrument in 2001. These victim centered instruments provide legal and service provision rights to Irish victims of crime, but they do not generate much academic interest. This research, in addition to providing a detailed account of the victim centered instruments, analyses the jurisprudence of the European Court of Human Rights, and identifies and analyses the primary victim centered statutory modifications and case law in Ireland over the past three decades. Lastly, the current law and practices in Ireland are evaluated against Ireland’s obligations under international and E.U. law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This Portfolio of Exploration outlines the course of learning by a practitioner on a personal leadership journey. It constructs a functional examination of ideas around leadership. It explores the belief system which underpins leadership practice and it also explores to what extent the increased participation of women can lead to a qualitatively different type of leadership. Different models of leadership are explored to find the model which can best fit with the author’s perception of leadership. The Women’s Intercultural Leadership Model is discussed. This model conceptualises leadership as the envisioning of oneself and others as potential leaders. It seeks to promote that recognition whilst at the same time encouraging personal transformation. The promotion of a values based leadership is examined. The value of fairness is examined as an element of functional leadership. The extent to which increasing the number of women in leadership can lead to a qualitatively different type of leadership is explored. Drucker’s assertion that every practice rests on theory is used to unearth the underlying assumptions of this reflective practitioner doctorate. Kegan’s Theory of Adult Mental Development and Subject-Object separation is used to explicitly examine knowledge construction. Myers Briggs Type Indicator (MBTI) and Assumption/Commitment/Behaviour/Outcome (ACBO) template are used to promote practice change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: This thesis examines a question posed by founding occupational scientist Dr. Elizabeth Yerxa (1993) – “what is the relationship between human engagement in a daily round of activity (such as work, play, rest and sleep) and the quality of life people experience including their healthfulness” (p. 3). Specifically, I consider Yerxa’s question in relation to the quotidian activities and health-related quality of life (HRQoL) of late adolescents (aged 15 - 19 years) in Ireland. This research enquiry was informed by an occupational perspective of health and by population health, ecological, and positive youth development perspectives. Methods: This thesis is comprised of five studies. Two scoping literature reviews informed the direction of three empirical studies. In the latter, cross-sectional time use and HRQoL data were collected from a representative sample of 731 school-going late adolescents (response rate 52%) across 28 schools across Cork city and county (response rate 76%). In addition to socio-demographic data, time use data were collected using a standard time diary instrument while a nationally and internationally validated instrument, the KIDSCREEN-52, was used to measure HRQoL. Variable-centred and person-centred analyses were used. Results: The scoping reviews identified the lack of research on well populations or an adolescent age range within occupational therapy and occupational science; limited research testing the popular assumption that time use is related to overall well-being and quality of life; and the absence of studies that examined adolescent 24-hour time use and quality of life. Established international trends were mirrored in the findings of the examination of weekday and weekend time use. Aggregate-level, variable-centred analyses yielded some significant associations between HRQoL and individual activities, independent of school year, school location, family context, social class, nationality or diary day. The person-centred analysis of overall time use identified three male profiles (productive, high leisure and all-rounder) and two female profiles (higher study/lower leisure and moderate study/higher leisure). There was tentative support for the association between higher HRQoL and more balanced time use profiles. Conclusion: The findings of this thesis highlight the gendered nature of adolescent time use and HRQoL. Participation in daily activities, singly and in combination, appears to be associated with HRQoL. However, the nature of this relationship is complex. Individually and collectively, adolescents need to be educated and supported to create health through their everyday patterns of doing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.