916 resultados para Sampling schemes
Resumo:
An overview is given of the various energy storage technologies which can be used in distributed generation (DG) schemes. Description of the recent photovoltaic DG initiative in Singapore is included, in which several of the storage systems can find ready applications. Schemes pertaining to the use of solid oxide fuel cell for power quality enhancement and battery energy storage system used in conjunction with wind power generation are also described.
Resumo:
This article considers the changes to the Swimming Pools Act 1992 (NSW)(Act) which established a State-wide online register of all private swimming pools in NSW requiring pool owners to register their pools by 19 November 2013. Amendments to the Act introduced changes to the conveyancing and residential tenancy regulations to require vendors and landlords to have a valid Compliance Certificate issued for their swimming pool before offering the property for sale or lease. This article provides a brief overview of the new sale and leasing requirements effective from 29 April 2014, focusing on its application to lot owners within strata and community title schemes and other owners of water front properties with pools on Crown Land Reserves.
Resumo:
Effluent from sewage treatment plants has been associated with a range of pollutant effects. Depending on the influent composition and treatment processes the effluent may contain a myriad of different chemicals which makes monitoring very complex. In this study we aimed to monitor relatively polar organic pollutant mixtures using a combination of passive sampling techniques and a set of biochemistry based assays covering acute bacterial toxicity (Microtox™), phytotoxicity (Max-I-PAM assay) and genotoxicity (umuC assay). The study showed that all of the assays were able to detect effects in the samples and allowed a comparison of the two plants as well as a comparison between the two sampling periods. Distinct improvements in water quality were observed in one of the plants as result of an upgrade to a UV disinfection system, which improved from 24× sample enrichment required to induce a 50% response in the Microtox™ assay to 84×, from 30× sample enrichment to induce a 50% reduction in photosynthetic yield to 125×, and the genotoxicity observed in the first sampling period was eliminated. Thus we propose that biochemical assay techniques in combination with time integrated passive sampling can substantially contribute to the monitoring of polar organic toxicants in STP effluents.
Resumo:
Transfer schemes are an alternative means of acquiring control of a company to making a takeover bid under the provisions in Ch 6 of the Corporations Act 2001 (Cth). The recent decision Re Kumarina Resources Ltd [2013] FCA 549 overturned long-standing practice in relation to a certain type of transfer scheme. If followed, the decision would allow a “bidder” to vote at scheme meetings where the scheme consideration for the acquisition of the target shares are shares in another company, and the scheme results in a merger. But the bidder is not allowed to vote where the scheme consideration is cash. The article points out the difficulties arising from this decision and argues that it should not be followed. In providing a “no objection” statement, the Australian Securities and Investments Commission (ASIC) has created uncertainty as to the approach it will take towards the bidders being allowed to vote at scheme meetings where the scheme consideration for the acquisition of target shares are shares in another company. The article also points out that in providing the no objection statement in Kumarina, ASIC appears to have ignored breaches of s 606(1) of the Corporations Act. There is a pressing need for ASIC to clarify its position and, in particular, whether or not it will provide a no objection statement in respect of future transfer schemes where a bidder (or its parent company) votes at the scheme meeting.
Resumo:
Although there are many potential new insights to be gained through advancing research on the clients of male sex workers, significant social, ethical and methodological challenges to accessing this population exist. This research project case explores our attempts to recruit a population that does not typically form a cohesive or coherent 'community' and often avoids self-identifying to mitigate the stigma attached to buying sex. We used an arms-length recruitment campaign that focussed on directing potential participants to our study website, which could in turn lead them to participate in an anonymous telephone interview. Barriers to reaching male sex-work clients, however, demanded the evolution of our recruitment strategy. New technologies are part of the solution to accessing a hard-to-reach population, but they only work if researchers engage responsively. We also show how we conducted an in-depth interview with a client and discuss the value of using secondary data.
Resumo:
A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.
Resumo:
In this paper, a class of unconditionally stable difference schemes based on the Pad´e approximation is presented for the Riesz space-fractional telegraph equation. Firstly, we introduce a new variable to transform the original dfferential equation to an equivalent differential equation system. Then, we apply a second order fractional central difference scheme to discretise the Riesz space-fractional operator. Finally, we use (1, 1), (2, 2) and (3, 3) Pad´e approximations to give a fully discrete difference scheme for the resulting linear system of ordinary differential equations. Matrix analysis is used to show the unconditional stability of the proposed algorithms. Two examples with known exact solutions are chosen to assess the proposed difference schemes. Numerical results demonstrate that these schemes provide accurate and efficient methods for solving a space-fractional hyperbolic equation.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.
Resumo:
Background Anaemia is common in critically ill patients, and has a significant negative impact on patients' recovery. Blood conservation strategies have been developed to reduce the incidence of iatrogenic anaemic caused by sampling for diagnostic testing. Objectives Describe practice and local guidelines in adult, paediatric and neonatal Australian intensive care units (ICUs) regarding blood sampling and conservation strategies. Methods Cross-sectional descriptive study, conducted July 2013 over one week in single adult, paediatric and neonatal ICUs in Brisbane. Data were collected on diagnostic blood samples obtained during the study period, including demographic and acuity data of patients. Institutional blood conservation practice and guidelines were compared against seven evidence-based recommendations. Results A total of 940 blood sampling episodes from 96 patients were examined across three sites. Arterial blood gas was the predominant reason for blood sampling in each unit, accounting for 82% of adult, 80% of paediatric and 47% of neonatal samples taken (p <. 0.001). Adult patients had significantly more median [IQR] samples per day in comparison to paediatrics and neonates (adults 5.0 [2.4]; paediatrics 2.3 [2.9]; neonatal 0.7 [2.7]), which significantly increased median [IQR] blood sampling costs per day (adults AUD$101.11 [54.71]; paediatrics AUD$41.55 [56.74]; neonatal AUD$8.13 [14.95]; p <. 0.001). The total volume of samples per day (median [IQR]) was also highest in adults (adults 22.3. mL [16.8]; paediatrics 5.0. mL [1.0]; neonates 0.16. mL [0.4]). There was little information about blood conservation strategies in the local clinical practice guidelines, with the adult and neonatal sites including none of the seven recommendations. Conclusions There was significant variation in blood sampling practice and conservation strategies between critical care settings. This has implications not only for anaemia but also infection control and healthcare costs.
Resumo:
As one of the largest sources of greenhouse gas (GHG) emissions, the building and construction sector is facing increasing pressure to reduce its life cycle GHG emissions. One central issue in striving towards reduced carbon emissions in the building and construction sector is to develop a practical and meaningful yardstick to assess and communicate GHG results through carbon labelling. The idea of carbon labelling schemes for building materials is to trigger a transition to a low carbon future by switching consumer-purchasing habits to low-carbon alternatives. As such, failing to change purchasing pattern and behaviour can be disastrous to carbon labelling schemes. One useful tool to assist customers to change their purchasing behaviour is benchmarking, which has been very commonly used in ecolabelling schemes. This paper analyses the definition and scope of benchmarking in the carbon labelling schemes for building materials. The benchmarking process has been examined within the context of carbon labelling. Four practical issues for the successful implementation of benchmarking, including the availability of benchmarks and databases, the usefulness of different types of benchmarks and the selection of labelling practices have also been clarified.
Resumo:
This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.