911 resultados para ISRP (Computer program)


Relevância:

80.00% 80.00%

Publicador:

Resumo:

There has been a worldwide trend to increase axle loads and train speeds. This means that railway track degradation will be accelerated, and track maintenance costs will be increased significantly. There is a need to investigate the consequences of increasing traffic load. The aim of the research is to develop a model for the analysis of physical degradation of railway tracks in response to changes in traffic parameters, especially increased axle loads and train speeds. This research has developed an integrated track degradation model (ITDM) by integrating several models into a comprehensive framework. Mechanistic relationships for track degradation hav~ ?een used wherever possible in each of the models contained in ITDM. This overcc:mes the deficiency of the traditional statistical track models which rely heavily on historical degradation data, which is generally not available in many railway systems. In addition statistical models lack the flexibility of incorporating future changes in traffic patterns or maintenance practices. The research starts with reviewing railway track related studies both in Australia and overseas to develop a comprehensive understanding of track performance under various traffic conditions. Existing railway related models are then examined for their suitability for track degradation analysis for Australian situations. The ITDM model is subsequently developed by modifying suitable existing models, and developing new models where necessary. The ITDM model contains four interrelated submodels for rails, sleepers, ballast and subgrade, and track modulus. The rail submodel is for rail wear analysis and is developed from a theoretical concept. The sleeper submodel is for timber sleepers damage prediction. The submodel is developed by modifying and extending an existing model developed elsewhere. The submodel has also incorporated an analysis for the likelihood of concrete sleeper cracking. The ballast and subgrade submodel is evolved from a concept developed in the USA. Substantial modifications and improvements have been made. The track modulus submodel is developed from a conceptual method. Corrections for more global track conditions have been made. The integration of these submodels into one comprehensive package has enabled the interaction between individual track components to be taken into account. This is done by calculating wheel load distribution with time and updating track conditions periodically in the process of track degradation simulation. A Windows-based computer program ~ssociated with ITDM has also been developed. The program enables the user to carry out analysis of degradation of individual track components and to investigate the inter relationships between these track components and their deterioration. The successful implementation of this research has provided essential information for prediction of increased maintenance as a consequence of railway trackdegradation. The model, having been presented at various conferences and seminars, has attracted wide interest. It is anticipated that the model will be put into practical use among Australian railways, enabling track maintenance planning to be optimized and potentially saving Australian railway systems millions of dollars in operating costs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Environmental education is a field which has only come of age since the late nineteen sixties. While its content and practice have been widely debated and researched, its leadership has been minimally studied and, therefore, is only partially understood. The role of mentoring in the development of leaders has been alluded to, but has attracted scant research. Therefore, this study explores the importance of mentoring during the personal and professional development of leaders in environmental education. Four major research questions were investigated. Firstly, have leaders been men to red during their involvement with environmental education? Secondly, when and how has that mentoring taken place? Thirdly, what was the personal and professional effectiveness of the mentoring relationship? Fourthly, is there any continuation of the mentoring process which might be appropriate for professional development within the field of environmental education? Leaders were solicited from a broad field of environmental educators including teachers, administrators, academics, natural resource personnel, business and community persons. They had to be recognized as active leaders across several environmental education networks. The research elicited qualitative and quantitative survey data from fifty seven persons in Queensland, Australia and Colorado, USA. Seventeen semi-structured interviews were subsequently conducted with selected leaders who had nominated their mentors. This led to a further thirteen 'linked interviews' with some of the mentors' mentors and new mentorees. The interview data is presented as four cases reflecting pairs, triads, chains and webs of relationships- a major finding of the research process. The analysis of the data from the interviews and the surveys was conducted according to a grounded theory approach and was facilitated by NUD.IST, a computer program for non-numerical text analysis. The findings of the study revealed many variations on the classical mentoring patterns found in the literature. Gender and age were not seen as mportant factors, as there were examples of contemporaries in age, older men to younger women, older women to younger men, and women to women. Personal compatibility, professional respect and philosophical congruence were critical. Mentoring was initiated from early, mid and late career stages with the average length of the relationship being fourteen years. There was seldom an example of the mentoree using the mentor for hierarchical career climbing, although frequent career changes were made. However, leadership actions were found to increase after the intervention of a mentoring relationship. Three major categories of informal mentoring were revealed - perceived,acknowledged and deliberate. Further analysis led to the evolution of the core concept, a 'cascade of influence'. The major finding of this study was that this sample of leaders, mentors and new mentorees moved from the perception of having been mentored to the acknowledgment of these relationships and an affirmation of their efficacy for both personal and professional growth. Hence, the participants were more likely to continue future mentoring, not as a serendipitous happening, but through a deliberate choice. Heightened awareness and more frequent 'cascading' of mentoring have positive implications for the professional development of future leaders in environmental education in both formal and informal settings. Effective mentoring in environmental education does not seek to create 'clones' of the mentors, but rather to foster the development of autonomous mentorees who share a philosophical grounding. It is a deliberate invitation to 'join the clan'.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article places the 6 June 2012 transit of Venus in the context of James Cook’s voyage from England to the South Pacific to observe the 1769 transit of Venus. A description is given on how to use a computer program called Stellarium to ‘observe’ the 1769 transit of Venus exactly as Cook saw it from the island of Tahiti in the South Pacific.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

At the core of our uniquely human cognitive abilities is the capacity to see things from different perspectives, or to place them in a new context. We propose that this was made possible by two cognitive transitions. First, the large brain of Homo erectus facilitated the onset of recursive recall: the ability to string thoughts together into a stream of potentially abstract or imaginative thought. This hypothesis is sup-ported by a set of computational models where an artificial society of agents evolved to generate more diverse and valuable cultural outputs under conditions of recursive recall. We propose that the capacity to see things in context arose much later, following the appearance of anatomically modern humans. This second transition was brought on by the onset of contextual focus: the capacity to shift between a minimally contextual analytic mode of thought, and a highly contextual associative mode of thought, conducive to combining concepts in new ways and ‘breaking out of a rut’. When contextual focus is implemented in an art-generating computer program, the resulting artworks are seen as more creative and appealing. We summarize how both transitions can be modeled using a theory of concepts which high-lights the manner in which different contexts can lead to modern humans attributing very different meanings to the interpretation of one concept.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Intellectual Property - group of rights used to protect literary, artistic and industrial property. Generally separated into the categories of: • Copyright • Trade marks • Designs • Patents But also extends to specific subject matter of plant variety rights and circuit layouts and general information that is confidential such as trade secrets and protection of goodwill and reputation through the action of passing off. New information, be it a new computer program or novel device, developed by an organisation is valuable to it. So too is the organisation name and reputation. While some protection is automatic, like copyright, other protection and rights must be obtained under various legislation. When dealing with employees and third parties, ownership of existing and new rights needs to be clearly established so that rights are not lost. Obligations in relation to the use of certain property and any confidential information must also be clearly established...

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The act of computer programming is generally considered to be temporally removed from a computer program's execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the con- text of livecoding -- a live audiovisual performance practice. We then describe how the development of the programming environment "Impromptu" has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Motivation: Unravelling the genetic architecture of complex traits requires large amounts of data, sophisticated models and large computational resources. The lack of user-friendly software incorporating all these requisites is delaying progress in the analysis of complex traits. Methods: Linkage disequilibrium and linkage analysis (LDLA) is a high-resolution gene mapping approach based on sophisticated mixed linear models, applicable to any population structure. LDLA can use population history information in addition to pedigree and molecular markers to decompose traits into genetic components. Analyses are distributed in parallel over a large public grid of computers in the UK. Results: We have proven the performance of LDLA with analyses of simulated data. There are real gains in statistical power to detect quantitative trait loci when using historical information compared with traditional linkage analysis. Moreover, the use of a grid of computers significantly increases computational speed, hence allowing analyses that would have been prohibitive on a single computer. © The Author 2009. Published by Oxford University Press. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The invention relates to a method for monitoring user activity on a mobile device, comprising an input and an output unit, comprising the following steps preferably in the following order: detecting and / or logging user activity on said input unit, identifying a foreground running application, hashing of a user-interface-element management list of the foreground running application, and creating a screenshot comprising items displayed on said input unit. The invention also relates to a method for analyzing user activity at a server, comprising the following step: obtaining at least one of an information about detected and / or logged user activity, an information about a foreground running application, a hashed user-interface-element management list and a screenshot from a mobile device. Further, a computer program product is provided, comprising one or more computer readable media having computer executable instructions for performing the steps of at least one of the aforementioned methods.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Charcot-Marie-Tooth neuropathy type 1 (CMT1) is an autosomal dominant disorder originally localized to chromosome 1 by linkage to the Duffy blood group. Studies have since shown that the disorder may be heterogeneous, as not all families show this linkage. We tested genetic heterogeneity by the HOMOG computer program in 15 CMT1 pedigrees informative for Duffy. We detected no evidence for heterogeneity in this sample, but when we combined results with previously published lod scores, heterogeneity was statistically significant. Twelve of the 15 families studied did not show linkage to Duffy. We found six of these families to be informative for a chromosome 19 marker, apolipoprotein CII(ApoC2). Despite a previous report showing probable linkage of a non-Duffy-linked CMT1 pedigree to two chromosome 19 markers, we did not detect significant linkage of ApoC2 to CMT1 in these families.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Motivation: Gene silencing, also called RNA interference, requires reliable assessment of silencer impacts. A critical task is to find matches between silencer oligomers and sites in the genome, in accordance with one-to-many matching rules (G-U matching, with provision for mismatches). Fast search algorithms are required to support silencer impact assessments in procedures for designing effective silencer sequences.Results: The article presents a matching algorithm and data structures specialized for matching searches, including a kernel procedure that addresses a Boolean version of the database task called the skyline search. Besides exact matches, the algorithm is extended to allow for the location-specific mismatches applicable in plants. Computational tests show that the algorithm is significantly faster than suffix-tree alternatives. © The Author 2010. Published by Oxford University Press. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Lean strategies have been developed to eliminate or reduce waste and thus improve operational efficiency in a manufacturing environment. However, in practice, manufacturers encounter difficulties to select appropriate lean strategies within their resource constraints and to quantitatively evaluate the perceived value of manufacturing waste reduction. This paper presents a methodology developed to quantitatively evaluate the contribution of lean strategies selected to reduce manufacturing wastes within the manufacturers’ resource (time) constraints. A mathematical model has been developed for evaluating the perceived value of lean strategies to manufacturing waste reduction and a step-by-step methodology is provided for selecting appropriate lean strategies to improve the manufacturing performance within their resource constraints. A computer program is developed in MATLAB for finding the optimum solution. With the help of a case study, the proposed methodology and developed model has been validated. A ‘lean strategy-wastes’ correlation matrix has been proposed to establish the relationship between the manufacturing wastes and lean strategies. Using the correlation matrix and applying the proposed methodology and developed mathematical model, authors came out with optimised perceived value of reduction of a manufacturer's wastes by implementing appropriate lean strategies within a manufacturer's resources constraints. Results also demonstrate that the perceived value of reduction of manufacturing wastes can significantly be changed based on policies and product strategy taken by a manufacturer. The proposed methodology can also be used in dynamic situations by changing the input in the programme developed in MATLAB. By identifying appropriate lean strategies for specific manufacturing wastes, a manufacturer can better prioritise implementation efforts and resources to maximise the success of implementing lean strategies in their organisation.