998 resultados para route maintenance protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a group maintenance scheduling case study for a water distributed network. This water pipeline network presents the challenge of maintaining aging pipelines with the associated increases in annual maintenance costs. The case study focuses on developing an effective maintenance plan for the water utility. Current replacement planning is difficult as it needs to balance the replacement needs under limited budgets. A Maintenance Grouping Optimization (MGO) model based on a modified genetic algorithm was utilized to develop an optimum group maintenance schedule over a 20-year cycle. The adjacent geographical distribution of pipelines was used as a grouping criterion to control the searching space of the MGO model through a Judgment Matrix. Based on the optimum group maintenance schedule, the total cost was effectively reduced compared with the schedules without grouping maintenance jobs. This optimum result can be used as a guidance to optimize the current maintenance plan for the water utility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple and efficient route for the synthesis of cyclic polymer systems is presented. Linear furan protected α-maleimide-ω-cyclopentadienyl functionalized precursors (poly(methyl methacrylate) and poly(tert-butyl acrylate)) were synthesized via atom transfer radical polymerization (ATRP) and subsequent substitution of the bromine end-group with cyclopentadiene. Upon heating at high dilution, deprotection of the dieneophile occurs followed by an intramolecular Diels–Alder reaction yielding a high purity cyclic product.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an effort to evaluate and improve their practices to ensure the future excellence of the Texas highway system, the Texas Department of Transportation (TxDOT) sought a forum in which experts from other state departments of transportation could share their expertise. Thus, the Peer State Review of TxDOT Maintenance Practices project was organized and conducted for TxDOT by the Center for Transportation Research (CTR) at The University of Texas at Austin. The goal of the project was to conduct a workshop at CTR and in the Austin District that would educate the visiting peers on TxDOT’s maintenance practices and invite their feedback. CTR and TxDOT arranged the participation of the following directors of maintenance: Steve Takigawa, CA; Roy Rissky, KS; Eric Pitts, GA; Jim Carney, MO; Jennifer Brandenburg, NC; and David Bierschbach, WA. One of the means used to capture the peer reviewers’ opinions was a carefully designed booklet of 15 questions. The peers provided TxDOT with written responses to these questions, and the oral comments made during the workshop were also captured. This information was then compiled and summarized in the following report. An examination of the peers’ comments suggests that TxDOT should use a more holistic, statewide approach to funding and planning rather than funding and planning for each district separately. Additionally, the peers stressed the importance of allocating funds based on the actual conditions of the roadways instead of on inventory. The visiting directors of maintenance also recommended continuing and proliferating programs that enhance communication, such as peer review workshops.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper different aspects of teaching tribology and maintenance-related subjects with a hands-on focus at Queensland University of Technology (QUT) are presented and discussed. As part of the study, a combination of data from core units, such as engineering design units, and elective units, was used, in addition to laboratory experiments, real-life projects, interactive software packages and industry visits. The mechanical engineering curriculum structure used at QUT, consisting of the main specialization (first major) and the second specialization (second major), is also discussed with specific emphasis on the teaching of tribology and maintenance-related subjects. To evaluate students' satisfaction with the novel teaching approaches used, tailored questionnaires were used as well as QUT's online learning experience survey (LEX). Statistical results of these sureveys are presented and discussed. In summary, these showed that students overwhelmingly support the hands-on and practical focus in teaching tribology and maintenance-related subjects and that the teaching approaches used shorten the learning curve and make students better prepared for integration in the workplace.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have designed a mobile application that takes advantage of the built-in features of smart phones such as camera and GPS that allow users to take geo-tagged photos while on the move. Urban residents can take pictures of broken street furniture and public property requiring repair, attach a brief description, and submit the information as a maintenance request to the local government organisation of their city. This paper discusses the design approach that led to the application, highlights a built-in mechanism to elicit user feedback, and evaluates the progress to date with user feedback and log statistics. It concludes with an outlook highlighting user requested features and our own design aspirations for moving from a reporting tool to a civic engagement tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose Maintenance management is a core process in infrastructure asset management. Infrastructure organisations must constantly strive to ensure the effectiveness of this process in order to obtain the greatest lifetime value from their infrastructure assets. This paper aims to investigate how infrastructure organisations can enhance the effectiveness of their maintenance management process. Approach This study utilised multiple case studies as the research approach. The case organisations were asked to identify the challenges faced in the maintenance process and the approaches they have adopted to overcome these challenges. Analysis of these findings, together with deductive reasoning, leads to the development of the proposed capability needed for effective maintenance management process. Findings The case studies reveal that maintenance management process is a core process in ensuring that infrastructure assets are optimally and functionally available to support business operations. However, the main challenge is the lack of skilled and experienced personnel to understand and anticipate maintenance requirement. A second challenge is the reduced window of time available to carry out inspection and maintenance works. To overcome these challenges, the case organisations have invested in technologies. However, technologies available to facilitate this process are complex and constantly changing. Consequently, there is a need for infrastructure organizations to develop their technological absorptive capability, i.e. the ability to embrace and capitalize on new technologies to enhance their maintenance management process. Originality/Value This paper is original in that it provides empirical evidence to identify technological absorptive capability as core to improving the maintenance management process. The findings are valuable because it sheds light on where infrastructure organisation, regardless of whether they are privately or publicly owned, should channel their scarce resources. The development of the core capability will ensure that the maintenance process can contribute value to their organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel algorithm for localization during navigation that performs matching over local image sequences. Instead of calculating the single location most likely to correspond to a current visual scene, the approach finds candidate matching locations within every section (subroute) of all learned routes. Through this approach, we reduce the demands upon the image processing front-end, requiring it to only be able to correctly pick the best matching image from within a short local image sequence, rather than globally. We applied this algorithm to a challenging downhill mountainbiking visual dataset where there was significant perceptual or environment change between repeated traverses of the environment, and compared performance to applying the feature-based algorithm FAB-MAP. The results demonstrate the potential for localization using visual sequences, even when there are no visual features that can be reliably detected.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a road survey as part of a workshop conducted by the Texas Department of Transportation (TxDOT) to evaluate and improve the maintenance practices of the Texas highway system. Directors of maintenance from six peer states (California, Kansas, Georgia, Missouri, North Carolina, and Washington) were invited to this 3-day workshop. One of the important parts of this workshop was a Maintenance Test Section Survey (MTSS) to evaluate a number of pre-selected one-mile roadway sections. The workshop schedule allowed half a day to conduct the field survey and 34 sections were evaluated. Each of the evaluators was given a booklet and asked to rate the selected road sections. The goals of the MTSS were to: 1. Assess the threshold level at which maintenance activities are required as perceived by the evaluators from the peer states; 2. Assess the threshold level at which maintenance activities are required as perceived by evaluators from other TxDOT districts; and 3. Perform a pilot evaluation of the MTSS concept. This paper summarizes the information obtained from survey and discusses the major findings based on a statistical analysis of the data and comments from the survey participants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To assess and improve their practices, and thus ensure the future excellence of the Texas highway system, the Texas Department of Transportation (TxDOT) sought a forum in which experts from other State Departments of Transportation could evaluate the TxDOT maintenance program and practices based on their expertise. To meet this need, a Peer State Review of TxDOT Maintenance Practices project was organized and conducted by the Center for Transportation Research (CTR) at The University of Texas at Austin. CTR researchers, along with TxDOT staff, conducted a workshop to present TxDOT’s maintenance practices to the visiting peer reviewers and invite their feedback. Directors of maintenance from six different states—California, Kansas, Georgia, Missouri, North Carolina, and Washington—participated in the workshop. CTR and TxDOT worked together to design a questionnaire with 15 key questions to capture the peers’ opinions on maintenance program and practices. This paper compiles and summarizes this information. The examination results suggested that TxDOT should use a more state-wide approach to funding and planning, in addition to funding and planning for each district separately. Additionally, the peers recommended that criteria such as condition and level of service of the roadways be given greater weight in the funding allocation than lane miles or vehicle miles traveled (VMT). The Peer Reviewers also determined that TxDOT maintenance employee experience and communications were strong assets. Additional strengths included the willingness of TxDOT to invite peer reviews of their practices and a willingness to consider opportunities for improvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs.