94 resultados para sloping side walls
Resumo:
The experience of border crossing for refugees and irregular migrants challenges global border and migration controls in multiple contexts. Using qualitative field research in Tanzania, Spain, Morocco and Australia, Heather Johnson asks how a global regime of migration management and control can be perceived through the dynamics of particular border spaces: refugee camps, border zones and detention centres. She explores how irregular migrants are impacted by the increasingly security-oriented practices of border control, and how they confront these practices. Johnson rejects the characterization of border spaces as exceptional, abject and exclusionary, arguing instead for an understanding of politics as everyday contestation that reveals a radical political agency, re-imagining the global non-citizen as a transgressive and powerful figure. Building on recent scholarship that rethinks irregularity and non-citizenship, her conclusions have broad implications for how we understand irregular migration from a position of dialogue and solidarity.
Resumo:
The Aquivion short-side-chain (SSC) perfluorosulfonic acid (PFSA) ionomer was adopted in catalyst layers (CL) of polymer electrolyte membrane water electrolysers (PEMWE) instead of long-side-chain (LSC) Nafion ionomer. The effects of SSC ionomer content in CL for oxygen evolution reaction were studied in half cell with cyclic voltammetry and steady state linear sweep. In a single cell test the MEA with SSC-PFSA Aquivion ionomer exhibited better thermal stability than the one with LSC-PFSA Nafion ionomer at 90 °C. The cell voltage at a current density of 1 A cm was 1.63 V at 90 °C using the SSC-PFSA Aquivion ionomer binder, Nafion 117 membrane, and without back pressurizing. In a continuous operation the cell voltage degradation rate of the MEA using Aquivion ionomer binder was only about 0.82 mV h.
Resumo:
It has long been assumed that risk taking is closely associated with criminal behavior. One reason for placing criminals behind bars-aside from punishment and protecting the public-is to prevent them from engaging in further risky criminal activities. Limited attention has been paid to whether being inside or outside prison affects offenders' risk-taking behaviors and attitudes. We compared risk-taking behaviors and attitudes in five risk domains (ethical, financial, health/safety, recreational, social) among 75 incarcerated offenders (i.e., offenders who are currently in prison) and 45 ex-offenders (i.e., offenders who have just been released from prison). Ex-offenders reported higher likelihood of engaging in risky behavior, driven largely by a willingness to take more risks in the recreational and ethical domains. Benefits attributed to risk taking as well as risk perception did not differ between incarcerated and ex-offenders, indicating that the opportunity to take risks might underlie behavioral risk intentions. Our results also indicate that risk-taking activities are better predicted by the expected benefits rather than by risk perception, aside from the health/safety domain. These results highlight the importance of studying the person and the environment and examining risk taking in a number of content domains.
Resumo:
An unusual application of hydrological understanding to a police search is described. The lacustrine search for a missing person provided reports of bottom-water currents in the lake and contradictory indications from cadaver dogs. A hydrological model of the area was developed using pre-existing information from side scan sonar, a desktop hydrogeological study and deployment of water penetrating radar (WPR). These provided a hydrological theory for the initial search involving subaqueous groundwater flow, focused on an area of bedrock surrounded by sediment, on the lake floor. The work shows the value a hydrological explanation has to a police search operation (equally to search and rescue). With hindsight, the desktop study should have preceded the search, allowing better understanding of water conditions. The ultimate reason for lacustrine flow in this location is still not proven, but the hydrological model explained the problems encountered in the initial search.
Resumo:
The burial of objects (human remains, explosives, weapons) below or behind concrete, brick, plaster or tiling may be associated with serious crime and are difficult locations to search. These are quite common forensic search scenarios but little has been published on them to-date. Most documented discoveries are accidental or from suspect/witness testimony. The problem in locating such hidden objects means a random or chance-based approach is not advisable. A preliminary strategy is presented here, based on previous studies, augmented by primary research where new technology or applications are required. This blend allows a rudimentary search workflow, from remote desktop study, to non-destructive investigation through to recommendations as to how the above may inform excavation, demonstrated here with a case study from a homicide investigation. Published case studies on the search for human remains demonstrate the problems encountered when trying to find and recover sealed-in and sealed over locations. Established methods include desktop study, photography, geophysics and search dogs:these are integrated with new technology (LiDAR and laser scanning; photographic rectification; close quarter aerial imagery; ground-penetrating radar on walls and gamma-ray/neutron activation radiography) to propose this possible search strategy.
Resumo:
Simple meso-scale capacitor structures have been made by incorporating thin (300 nm) single crystal lamellae of KTiOPO4 (KTP) between two coplanar Pt electrodes. The influence that either patterned protrusions in the electrodes or focused ion beam milled holes in the KTP have on the nucleation of reverse domains during switching was mapped using piezoresponse force microscopy imaging. The objective was to assess whether or not variations in the magnitude of field enhancement at localised “hot-spots,” caused by such patterning, could be used to both control the exact locations and bias voltages at which nucleation events occurred. It was found that both the patterning of electrodes and the milling of various hole geometries into the KTP could allow controlled sequential injection of domain wall pairs at different bias voltages; this capability could have implications for the design and operation of domain wall electronic devices, such as memristors, in the future.
Resumo:
Due to the intermittent nature of renewable generation it is desirable to consider the potential of controlling the demand-side load to smooth overall system demand. The architecture and control methodologies of such a system on a large scale would require careful consideration. Some of these considerations are discussed in this paper; such as communications infrastructure, systems architecture, control methodologies and security. A domestic fridge is used in this paper as an example of a controllable appliance. A layered approach to smart-grid is introduced and it can be observed how each smart-grid component from physical cables, to the end-devices (or smart-applications) can be mapped to these set layers. It is clear how security plays an integral part in each component of the smart-grid so this is also an integral part of each layer. The controllable fridge is described in detail and as one potential smart-grid application which maps to the layered approach. A demonstration system is presented which involves a Raspberry Pi (a low-power, low-cost device representing the appliance controller).
Resumo:
This paper presents a new method for online determination of the Thèvenin equivalent parameters of a power system at a given node using the local PMU measurements at that node. The method takes into account the measurement errors and the changes in the system side. An analysis of the effects of changes in system side is carried out on a simple two-bus system to gain an insight of the effect of system side changes on the estimated Thévenin equivalent parameters. The proposed method uses voltage and current magnitudes as well as active and reactive powers; thus avoiding the effect of phase angle drift of the PMU and the need to synchronize measurements at different instances to the same reference. Applying the method to the IEEE 30-bus test system has shown its ability to correctly determine the Thévenin equivalent even in the presence of measurement errors and/or system side changes.
Resumo:
Context Medical students can have difficulty in distinguishing left from right. Many infamous medical errors have occurred when a procedure has been performed on the wrong side, such as in the removal of the wrong kidney. Clinicians encounter many distractions during their work. There is limited information on how these affect performance.
Objectives Using a neuropsychological paradigm, we aim to elucidate the impacts of different types of distraction on left–right (LR) discrimination ability.
Methods Medical students were recruited to a study with four arms: (i) control arm (no distraction); (ii) auditory distraction arm (continuous ambient ward noise); (iii) cognitive distraction arm (interruptions with clinical cognitive tasks), and (iv) auditory and cognitive distraction arm. Participants’ LR discrimination ability was measured using the validated Bergen Left–Right Discrimination Test (BLRDT). Multivariate analysis of variance was used to analyse the impacts of the different forms of distraction on participants’ performance on the BLRDT. Additional analyses looked at effects of demographics on performance and correlated participants’ self-perceived LR discrimination ability and their actual performance.
Results A total of 234 students were recruited. Cognitive distraction had a greater negative impact on BLRDT performance than auditory distraction. Combined auditory and cognitive distraction had a negative impact on performance, but only in the most difficult LR task was this negative impact found to be significantly greater than that of cognitive distraction alone. There was a significant medium-sized correlation between perceived LR discrimination ability and actual overall BLRDT performance.
Conclusions
Distraction has a significant impact on performance and multifaceted approaches are required to reduce LR errors. Educationally, greater emphasis on the linking of theory and clinical application is required to support patient safety and human factor training in medical school curricula. Distraction has the potential to impair an individual's ability to make accurate LR decisions and students should be trained from undergraduate level to be mindful of this.
Resumo:
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.