904 resultados para Missouri valley authority (Proposed)
Resumo:
A design Charrette was the starting point for understanding the different scales within the design process of this architectural intervention. The week-long, intense design activity promoted group interaction amongst students while examining local issues of the Fortitude Valley context. The process was an opportunity for the fourth year architectural design students to collaborate on a complex design problem. Students were asked to identify a unique condition of their site beyond the physical built environment. They were asked to consider the political and social context and respond to these by designing a temporary art gallery for underdeveloped areas within Fortitude Valley. The exhibition shows how architecture can invigorate a space by providing new use and new life.
Resumo:
Overall, computer models and simulations have a rather disappointing record within the management sciences as a tool for predicting the future. Social and market environments can be influenced by an overwhelming number of variables, and it is therefore difficult to use computer models to make forecasts or to test hypotheses concerning the relationship between individual behaviours and macroscopic outcomes. At the same time, however, advocates of computer models argue that they can be used to overcome the human mind's inability to cope with several complex variables simultaneously or to understand concepts that are highly counterintuitive. This paper seeks to bridge the gap between these two perspectives by suggesting that management research can indeed benefit from computer models by using them to formulate fruitful hypotheses.
Resumo:
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.
Resumo:
The main aim of this paper is to outline a proposed program of research which will attempt to quantify the extent of the problem of alcohol and other drugs in the Australian construction industry, and furthermore, develop an appropriate industry-wide policy and cultural change management program and implementation plan to address the problem. This paper will also present preliminary results from the study. The study will use qualitative and quantitative methods (in the form of interviews and surveys, respectively) to evaluate the extent of the problem of alcohol and other drug use in this industry, to ascertain the feasibility of an industry-wide policy and cultural change management program, and to develop an appropriate implementation plan. The study will be undertaken in several construction organisations, at selected sites in South Australia, Victoria and Northern Territory. It is anticipated that approximately 500 employees from the participating organisations across Australia will take part in the study. The World Health Organisation’s Alcohol Use Disorders Identification Test (AUDIT) will be used to measure the extent of alcohol use in the industry. Illicit drug use, ‘‘readiness to change’’, impediments to reducing impairment, feasibility of proposed interventions, and employee attitudes and knowledge regarding workplace AOD impairment, will also be measured through a combination of interviews and surveys. Among the preliminary findings, for 51% (n=127) of respondents, score on the AUDIT indicated alcohol use at hazardous levels. Of the respondents who were using alcohol at hazardous levels, 76% reported (n97) that they do not have a problem with drinking and 54% (n=68) reported that it would be easy to ‘‘cut down’’ or stop drinking. Nearly half (49%) of all respondents (n=122) had used marijuana/cannabis at some time prior to being surveyed. The use of other illicit substances was much less frequently reported. Preliminary interview findings indicated a lack of adequate employee knowledge regarding the physical effects of alcohol and other drugs in the workplace. As for conclusions, the proposed study will address a major gap in the literature with regard to the extent of the problem of alcohol and other drug use in the construction industry in Australia. The study will also develop and implement a national, evidence-based workplace policy, with the aim of mitigating the deleterious effects of alcohol and other drugs in this industry.
Resumo:
Public dialogue regarding the high concentration of drug use and crime in inner city locations is frequently legitimised through visibility of drug-using populations and a perception of high crime rates. The public space known as the Brunswick Street Mall (Valley mall), located in the inner city Brisbane suburb of Fortitude Valley, has long provided the focal point for discussions regarding the problem of illicit drug use and antisocial behaviour in Brisbane. During the late 1990s a range of stakeholders in Fortitude Valley became mobilised to tackle crime and illicit drugs. In particular they wanted to dismantle popular perceptions of the area as representing the dark and unsafe side of Brisbane. The aim of this campaign was to instil a sense of safety in the area and dislodge Fortitude Valley from its reputation as a =symbolic location of danger‘. This thesis is a case study about an urban site that became contested by the diverse aims of a range of stakeholders who were invested in an urban renewal program and community safety project. This case study makes visible a number of actors that were lured from their existing roles in an indeterminable number of heterogeneous networks in order to create a community safety network. The following analysis of the community safety network emphasises some specific actors: history, ideas, technologies, materialities and displacements. The case study relies on the work of Foucault, Latour, Callon and Law to draw out the rationalities, background contingencies and the attempts to impose order and translate a number of entities into the community safety project in Fortitude Valley. The results of this research show that the community safety project is a case of ontological politics. Specifically the data indicates that both the (reality) problem of safety and the (knowledge) solution to safety were created simultaneously. This thesis explores the idea that while violence continues to occur in the Valley, evidence that community safety got done is located through mapping its displacement and eventual disappearance. As such, this thesis argues that community safety is a =collateral reality‘.
Resumo:
Unmanned Aircraft Systems (UAS) describe a diverse range of aircraft that are operated without a human pilot on-board. Unmanned aircraft range from small rotorcraft, which can fit in the palm of your hand, through to fixed wing aircraft comparable in size to that of a commercial passenger jet. The absence of a pilot on-board allows these aircraft to be developed with unique performance capabilities facilitating a wide range of applications in surveillance, environmental management, agriculture, defence, and search and rescue. However, regulations relating to the safe design and operation of UAS first need to be developed before the many potential benefits from these applications can be realised. According to the International Civil Aviation Organization (ICAO), a Risk Management Process (RMP) should support all civil aviation policy and rulemaking activities (ICAO 2009). The RMP is described in International standard, ISO 31000:2009 (ISO, 2009a). This standard is intentionally generic and high-level, providing limited guidance on how it can be effectively applied to complex socio-technical decision problems such as the development of regulations for UAS. Through the application of principles and tools drawn from systems philosophy and systems engineering, this thesis explores how the RMP can be effectively applied to support the development of safety regulations for UAS. A sound systems-theoretic foundation for the RMP is presented in this thesis. Using the case-study scenario of a UAS operation over an inhabited area and through the novel application of principles drawn from general systems modelling philosophy, a consolidated framework of the definitions of the concepts of: safe, risk and hazard is made. The framework is novel in that it facilitates the representation of broader subjective factors in an assessment of the safety of a system; describes the issues associated with the specification of a system-boundary; makes explicit the hierarchical nature of the relationship between the concepts and the subsequent constraints that exist between them; and can be evaluated using a range of analytic or deliberative modelling techniques. Following the general sequence of the RMP, the thesis explores the issues associated with the quantified specification of safety criteria for UAS. A novel risk analysis tool is presented. In contrast to existing risk tools, the analysis tool presented in this thesis quantifiably characterises both the societal and individual risk of UAS operations as a function of the flight path of the aircraft. A novel structuring of the risk evaluation and risk treatment decision processes is then proposed. The structuring is achieved through the application of the Decision Support Problem Technique; a modelling approach that has been previously used to effectively model complex engineering design processes and to support decision-making in relation to airspace design. The final contribution made by this thesis is in the development of an airworthiness regulatory framework for civil UAS. A novel "airworthiness certification matrix" is proposed as a basis for the definition of UAS "Part 21" regulations. The outcome airworthiness certification matrix provides a flexible, systematic and justifiable method for promulgating airworthiness regulations for UAS. In addition, an approach for deriving "Part 1309" regulations for UAS is presented. In contrast to existing approaches, the approach presented in this thesis facilitates a traceable and objective tailoring of system-level reliability requirements across the diverse range of UAS operations. The significance of the research contained in this thesis is clearly demonstrated by its practical real world outcomes. Industry regulatory development groups and the Civil Aviation Safety Authority have endorsed the proposed airworthiness certification matrix. The risk models have also been used to support research undertaken by the Australian Department of Defence. Ultimately, it is hoped that the outcomes from this research will play a significant part in the shaping of regulations for civil UAS, here in Australia and around the world.
Resumo:
The popularity of Bayesian Network modelling of complex domains using expert elicitation has raised questions of how one might validate such a model given that no objective dataset exists for the model. Past attempts at delineating a set of tests for establishing confidence in an entirely expert-elicited model have focused on single types of validity stemming from individual sources of uncertainty within the model. This paper seeks to extend the frameworks proposed by earlier researchers by drawing upon other disciplines where measuring latent variables is also an issue. We demonstrate that even in cases where no data exist at all there is a broad range of validity tests that can be used to establish confidence in the validity of a Bayesian Belief Network.
Resumo:
This paper presents the details of a numerical study of a cold-formed steel beam known as LiteSteel Beam (LSB) subject to combined shear and bending actions. The LSB sections are produced by a patented manufacturing process involving simultaneous cold-forming and electric resistance welding. They have a unique shape of a channel beam with two rectangular hollow flanges. To date, however, no investigation has been conducted into the strength of LSB sections under combined shear and bending actions. Hence a numerical study was undertaken to investigate the behaviour and strength of LSBs subject to combined shear and bending actions. In this research, finite element models of LSBs were developed to simulate the combined shear and bending behaviour and strength of LSBs. They were then validated by comparing their results with test results and used in a parametric study. Both experimental and finite element analysis results showed that the current design equations are not suitable for combined shear and bending capacities of LSBs. Hence improved design equations are proposed for the capacities of LSBs subject to combined shear and bending actions.
Resumo:
This LiteSteel beam (LSB) is a new cold-formed steel hollow flange channel section produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. The LSBs are commonly used as floor joists and bearers with web openings in buildings. Their shear strengths are considerably reduced when web openings are included for the purpose of locating building services. Shear tests of LSBs with web openings have shown that there is up to 60% reduction in the shear capacity. Hence there is a need to improve the shear capacity of LSBs with web openings. A cost effective way to eliminate the shear capacity reduction is to stiffen the web openings using suitable stiffeners. Hence numerical studies were undertaken to investigate the shear capacity of LSBs with stiffened web openings. In this research, finite element models of LSBs with stiffened web openings in shear were developed to simulate the shear behaviour and strength of LSBs. Various stiffening methods using plate and LSB stiffeners attached to LSBs using both welding and screw-fastening were attempted. The developed models were then validated by comparing their results with experimental results and used in further studies. Both finite element and experimental results showed that the stiffening arrangements recommended by past research for cold-formed steel channel beams are not adequate to restore the shear strengths of LSBs with web openings. Therefore new stiffener arrangements were proposed for LSBs with web openings. This paper presents the details of this research project using numerical studies and the results.
Resumo:
The Lockyer Valley in southeast Queensland, Australia, hosts an economically significant alluvial aquifer system which has been impacted by prolonged drought conditions (~1997 to ~ 2009). Throughout this time, the system was under continued groundwater extraction, resulting in severe aquifer depletion. By 2008, much of the aquifer was at <30% of storage but some relief occurred with rains in early 2009. However, between December 2010 and January 2011, most of southeast Queensland experienced unprecedented flooding, which generated significant aquifer recharge. In order to understand the spatial and temporal controls of groundwater recharge in the alluvium, a detailed 3D lithological property model of gravels, sands and clays was developed using GOCAD software. The spatial distribution of recharge throughout the catchment was assessed using hydrograph data from about 400 groundwater observation wells screened at the base of the alluvium. Water levels from these bores were integrated into a catchment-wide 3D geological model using the 3D geological modelling software GOCAD; the model highlights the complexity of recharge mechanisms. To support this analysis, groundwater tracers (e.g. major and minor ions, stable isotopes, 3H and 14C) were used as independent verification. The use of these complementary methods has allowed the identification of zones where alluvial recharge primarily occurs from stream water during episodic flood events. However, the study also demonstrates that in some sections of the alluvium, rainfall recharge and discharge from the underlying basement into the alluvium are the primary recharge mechanisms of the alluvium. This is indicated by the absence of any response to the flood, as well as the observed old radiocarbon ages and distinct basement water chemistry signatures at these locations. Within the 3D geological model, integration of water chemistry and time-series displays of water level surfaces before and after the flood suggests that the spatial variations of the flood response in the alluvium are primarily controlled by the valley morphology and lithological variations within the alluvium. The integration of time-series of groundwater level surfaces in the 3D geological model also enables the quantification of the volumetric change of groundwater stored in the unconfined sections of this alluvial aquifer during drought and following flood events. The 3D representation and analysis of hydraulic and recharge information has considerable advantages over the traditional 2D approach. For example, while many studies focus on singular aspects of catchment dynamics and groundwater-surface water interactions, the 3D approach is capable of integrating multiple types of information (topography, geological, hydraulic, water chemistry and spatial) into a single representation which provides valuable insights into the major factors controlling aquifer processes.
Resumo:
A detailed 3D lithological model framework was developed using GOCAD software to understand interactions between alluvial, volcanic and GAB aquifers and the spatial and temporal distribution of groundwater recharge to the alluvium of the Lockyer Valley. Groundwater chemistry, isotope data (H20-δ2H and δ18O , 87Sr/86Sr, 3H and 14C) and groundwater level time-series data from approximately 550 observation wells were integrated into the catchment-wide 3D model to assess the recharge processes involved. This approach enabled the identification of zones where recharge to the alluvium primarily occurs from stream water during episodic flood events. Importantly, the study also demonstrates that in some sections of the alluvium recharge is also from storm rainfall and seepage discharge from the underlying GAB aquifers. These other sources of recharge are indicated by (a) the absence of a response of groundwater levels to flooding in some areas, (b) old radiocarbon ages, and (c) distinct bedrock water chemistry and δ2H and δ18O signatures in alluvial groundwater at these locations. Integration of isotopes, water chemistry and time-series displays of groundwater levels before and after the 2010/2011 flood into the 3D model suggest that the spatial variations in the alluvial groundwater response are mostly controlled by valley morphology and lithological (i.e. permeability) variations within the alluvium. Examination of the groundwater level variations in the 3D model also enabled quantification of the volumetric change of groundwater stored in the unconfined alluvial aquifer prior to and post-flood events.
Resumo:
Bactrocera dorsalis (Hendel) and B. papayae Drew & Hancock represent a closely related sibling species pair for which the biological species limits are unclear; i.e., it is uncertain if they are truely two biological species, or one biological species which has been incorrectly taxonomically split. The geographic ranges of the two taxa are thought to abut or overlap on or around the Isthmus of Kra, a recognised biogeographic barrier located on the narrowest portion of the Thai Peninsula. We collected fresh material of B. dorsalis sensu lato (i.e., B. dorsalis sensu stricto + B. papayae) in a north-south transect down the Thai Peninsula, from areas regarded as being exclusively B. dorsalis s.s., across the Kra Isthmus, and into regions regarded as exclusively B. papayae. We carried out microsatellite analyses and took measurements of male genitalia and wing shape. Both the latter morphological tests have been used previously to separate these two taxa. No significant population structuring was found in the microsatellite analysis and results were consistent with an interpretation of one, predominantly panmictic population. Both morphological datasets showed consistent, clinal variation along the transect, with no evidence for disjunction. No evidence in any tests supported historical vicariance driven by the Isthmus of Kra, and none of the three datasets supported the current taxonomy of two species. Rather, within and across the area of range overlap or abutment between the two species, only continuous morphological and genetic variation was recorded. Recognition that morphological traits previously used to separate these taxa are continuous, and that there is no genetic evidence for population segregation in the region of suspected species overlap, is consistent with a growing body of literature that reports no evidence of biological differentiation between these taxa.
Resumo:
The central purpose of this chapter is to address the tension between legal and medical discourses within the coronial/medico-legal system. In the context of a death investigation, medical expertise, manifest through the knowledge gained in an internal autopsy, is positioned as contributing the more valuable facts of the case, especially when contrasted with the evidence gathered at the scene of the death. We challenge this taken for granted understanding of medical knowledge in three ways: first, we examine the aspects of the history, philosophy and consequences of the processes by which the medical model gained its current dominance; second, we challenge the assumption that internal autopsy adds value to the death investigation, by utilising data from our own research in Australia; and finally, we engage with the debate about the purpose of a coronial/medico-legal investigation and role of an internal autopsy within that system.
Resumo:
This book explores the relationship between gender and power in Burmese history from pre-colonial times to the present day and aims to identify the sources, nature and limitations of women’s power. The study takes as its starting point the apparent contradiction that, though Burmese women historically enjoyed relatively high social status and economic influence, for the most part they remained conspicuously absent from positions of authority in formal religious, social and political institutions. The book thus examines the concept of ‘family’ in Burmese political culture, and reveals how some women were able to gain political influence through their familial connections with powerful men, even while cultural models of ‘correct’ female behaviour prevented most women from attaining official positions of political authority. The study also considers how various influences – Buddhism, colonialism, nationalism, modernisation and militarism – shaped Burmese concepts of gender and power, with important implications for how women were able to exercise social, economic and political influence. The book explores how the effects of prolonged armed conflict, economic isolation and political oppression have constrained opportunities for women to attain power in contemporary Burma, and examines opportunities opened up by the pro-democracy movement and recent focus on women's issues and rights for women to exercise influence both inside Burma and in exile. Using an interdisciplinary approach that draws on feminist, anthropological and social science discourses, placing them within an historical framework, the author offers a broad understanding of how power is obtained and exercised in Burma in order to reassess historical representations of Burmese women and so provide a more comprehensive and inclusive understanding of power relations in historical and contemporary Burma.
Resumo:
Poorly characterized phases (PCP's) may constitute up to 30 volume percent of some C2M carbonaceous chondrite matrices [1] and are an important key to an understanding of matrix evolution. PCPs are usually fine-grained (