976 resultados para Power-sharing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The following paper presents an evaluation of airborne sensors for use in vegetation management in powerline corridors. Three integral stages in the management process are addressed including, the detection of trees, relative positioning with respect to the nearest powerline and vegetation height estimation. Image data, including multi-spectral and high resolution, are analyzed along with LiDAR data captured from fixed wing aircraft. Ground truth data is then used to establish the accuracy and reliability of each sensor thus providing a quantitative comparison of sensor options. Tree detection was achieved through crown delineation using a Pulse-Coupled Neural Network (PCNN) and morphologic reconstruction applied to multi-spectral imagery. Through testing it was shown to achieve a detection rate of 96%, while the accuracy in segmenting groups of trees and single trees correctly was shown to be 75%. Relative positioning using LiDAR achieved a RMSE of 1.4m and 2.1m for cross track distance and along track position respectively, while Direct Georeferencing achieved RMSE of 3.1m in both instances. The estimation of pole and tree heights measured with LiDAR had a RMSE of 0.4m and 0.9m respectively, while Stereo Matching achieved 1.5m and 2.9m. Overall a small number of poles were missed with detection rates of 98% and 95% for LiDAR and Stereo Matching.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose Multi-level diode-clamped inverters have the challenge of capacitor voltage balancing when the number of DC-link capacitors is three or more. On the other hand, asymmetrical DC-link voltage sources have been applied to increase the number of voltage levels without increasing the number of switches. The purpose of this paper is to show that an appropriate multi-output DC-DC converter can resolve the problem of capacitor voltage balancing and utilize the asymmetrical DC-link voltages advantages. Design/methodology/approach A family of multi-output DC-DC converters is presented in this paper. The application of these converters is to convert the output voltage of a photovoltaic (PV) panel to regulate DC-link voltages of an asymmetrical four-level diode-clamped inverter utilized for domestic applications. To verify the versatility of the presented topology, simulations have been directed for different situations and results are presented. Some related experiments have been developed to examine the capabilities of the proposed converters. Findings The three-output voltage-sharing converters presented in this paper have been mathematically analysed and proven to be appropriate to improve the quality of the residential application of PV by means of four-level asymmetrical diode-clamped inverter supplying highly resistive loads. Originality/value This paper shows that an appropriate multi-output DC-DC converter can resolve the problem of capacitor voltage balancing and utilize the asymmetrical DC-link voltages advantages and that there is a possibility of operation at high-modulation index despite reference voltage magnitude and power factor variations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter looks at issues of non-stationarity in determining when a transient has occurred and when it is possible to fit a linear model to a non-linear response. The first issue is associated with the detection of loss of damping of power system modes. When some control device such as an SVC fails, the operator needs to know whether the damping of key power system oscillation modes has deteriorated significantly. This question is posed here as an alarm detection problem rather than an identification problem to get a fast detection of a change. The second issue concerns when a significant disturbance has occurred and the operator is seeking to characterize the system oscillation. The disturbance initially is large giving a nonlinear response; this then decays and can then be smaller than the noise level ofnormal customer load changes. The difficulty is one of determining when a linear response can be reliably identified between the non-linear phase and the large noise phase of thesignal. The solution proposed in this chapter uses “Time-Frequency” analysis tools to assistthe extraction of the linear model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dynamic load sharing can be defined as a measure of the ability of a heavy vehicle multi-axle group to equalise load across its wheels under typical travel conditions; i.e. in the dynamic sense at typical travel speeds and operating conditions of that vehicle. Various attempts have been made to quantify the ability of heavy vehicles to equalise the load across their wheels during travel. One of these was the concept of the load sharing coefficient (LSC). Other metrics such as the dynamic load coefficient (DLC) have been used to compare one heavy vehicle suspension with another for potential road damage. This paper compares these metrics and determines a relationship between DLC and LSC with sensitivity analysis of this relationship. The shortcomings of these presently-available metrics are discussed with a new metric proposed - the dynamic load equalisation (DLE) measure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper employs empirical evidence from a survey of Queensland secondary school students to examine their knowledge about their wages and working conditions. It does so within the theoretical lens of the Gagne (or Gagne-Briggs) theory of instruction, which centres on the content of learning and how learning is acquired (Gagne, Briggs & Wager, 1988). While Gagne articulates five categories of learning, our focus here is on two; verbal information or declarative knowledge (facts that people can declare), and procedural knowledge (the rules and procedures for achieving outcomes). We show that student workers know little about the instruments governing their employment, or their workplace entitlements. Of the total sample of year 9 and year 11 students surveyed (n=892), those students who worked, or who had worked in the past year (n=438), were asked to identify whether they were employed under an award, collective agreement or AWA. Eighty three per cent of students did not know which industrial instrument set their wages. We argue that if young workers do not have declarative knowledge of their entitlements, nor basic procedural knowledge about redress, then they are not in a position to deploy Gagne’s ‘cognitive strategies’ that would enable them to take action to ensure their working conditions meet legal minima. We advocate that young workers should be given summary information on their wages and other entitlements on appointment and that such summary information should be readily available on employers’ noticeboards and electronically on company websites, and that the information should include a brief summary of avenues for redressing issues of underpayment or sub-standard conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Principal Topic: ''In less than ten years music labels will not exist anymore.'' Michael Smelli, former Global COO Sony/BMG MCA/QUT IMP Business Lab Digital Music Think Thanks 9 May 2009, Brisbane Big music labels such as EMI, Sony BMG and UMG have been responsible for promoting and producing a myriad of stars in the music industry over the last decades. However, the industry structure is under enormous threat with the emergence of a new innovative era of digital music. Recent years have seen a dramatic shift in industry power with the emergence of Napster and other file sharing sites, iTunes and other online stores, iPod and the MP3 revolution. Myspace.com and other social networking sites are connecting entrepreneurial artists with fans and creating online music communities independent of music labels. In 2008 the digital music business internationally grew by around 25% to 3.7 Billion US-Dollar. Digital platforms now account for around 20% of recorded music sales, up from 15 % in 2007 (IFPI Digital music report 2009). CD sales have fallen by 40% since their peak levels. Global digital music sales totalled an estimated US$ 3 Billion in 2007, an increase of 40% on 2006 figures. Digital sales account for an estimated 15% of global market, up from 11% in 2006 and zero in 2003. The music industry is more advanced in terms of digital revenues than any other creative or entertainment industry (except games). Its digital share is more than twice that of newspapers (7%), films (35) or books (2%). All these shifts present new possibilities for music entrepreneurs to act entrepreneurially and promote their music independently of the major music labels. Diffusion of innovations has a long tradition in both sociology (e.g. Rogers 1962, 2003) and marketing (Bass 1969, Mahajan et al., 1990). The context of the current project is theoretically interesting in two respects. First, the role of online social networks replaces traditional face-to-face word of mouth communications. Second, as music is a hedonistic product, this strongly influences the nature of interpersonal communications and their diffusion patterns. Both of these have received very little attention in the diffusion literature to date, and no studies have investigated the influence of both simultaneously. This research project is concerned with the role of social networks in this new music industry landscape, and how this may be leveraged by musicians willing to act entrepreneurially. Our key research question we intend to address is: How do online social network communities impact the nature, pattern and speed that music diffuses? Methodology/Key Propositions : We expect the nature/ character of diffusion of popular, generic music genres to be different from specialized, niche music. To date, only Moe & Fader (2002) and Lee et al. (2003) investigated diffusion patterns of music and these focus on forecast weekly sales of music CDs based on the advance purchase orders before the launch, rather than taking a detailed look at diffusion patterns. Consequently, our first research questions are concerned with understanding the nature of online communications within the context of diffusion of music and artists. Hence, we have the following research questions: RQ1: What is the nature of fan-to-fan ''word of mouth'' online communications for music? Do these vary by type of artist and genre of music? RQ2: What is the nature of artist-to-fan online communications for music? Do these vary by type of artist and genre of music? What types of communication are effective? Two outcomes from research social network theory are particularly relevant to understanding how music might diffuse through social networks. Weak tie theory (Granovetter, 1973), argues that casual or infrequent contacts within a social network (or weak ties) act as a link to unique information which is not normally contained within an entrepreneurs inner circle (or strong tie) social network. A related argument, structural hole theory (Burt, 1992), posits that it is the absence of direct links (or structural holes) between members of a social network which offers similar informational benefits. Although these two theories argue for the information benefits of casual linkages, and diversity within a social network, others acknowledge that a balanced network which consists of a mix of strong ties, weak ties is perhaps more important overall (Uzzi, 1996). It is anticipated that the network structure of the fan base for different types of artists and genres of music will vary considerably. This leads to our third research question: RQ3: How does the network structure of online social network communities impact the pattern and speed that music diffuses? The current paper is best described as theory elaboration. It will report the first exploratory phase designed to develop and elaborate relevant theory (the second phase will be a quantitative study of network structure and diffusion). We intend to develop specific research propositions or hypotheses from the above research questions. To do so we will conduct three focus group discussions of independent musicians and three focus group discussions of fans active in online music communication on social network sites. We will also conduct five case studies of bands that have successfully built fan bases through social networking sites (e.g. myspace.com, facebook.com). The idea is to identify which communication channels they employ and the characteristics of the fan interactions for different genres of music. We intend to conduct interviews with each of the artists and analyse their online interaction with their fans. Results and Implications : At the current stage, we have just begun to conduct focus group discussions. An analysis of the themes from these focus groups will enable us to further refine our research questions into testable hypotheses. Ultimately, our research will provide a better understanding of how social networks promote the diffusion of music, and how this varies for different genres of music. Hence, some music entrepreneurs will be able to promote their music more effectively. The results may be further generalised to other industries where online peer-to-peer communication is common, such as other forms of entertainment and consumer technologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper seeks to identify what antecedents of power make it more or less likely for people to survive in a life-threatening situation.In particular, we look at the Titanic disaster as the life or death situation. Maritime disasters can be interpreted as quasi-natural experiments because every person is affected by the shock. True human nature becomes apparent in such a dangerous situation. Five antecedents of power are distinguished: physical strength, economic resources, nationality, social and moral factors. This empirical analysis supports the notion that power is a key determinant in extreme situations of life or death.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The previously distinct boundary between airports and their cities has become increasingly blurred as new interests and actors are identified as important stakeholders in the decision making process. As a consequence airport entities are more than ever seeking an integrated existence with their surrounding regions. While current planning strategies provide insights on how to improve and leverage land use planning in and around airports, emerging challenges for implementing and protecting these planning ideals stem from the governance shadows of development decisions. The thesis of this paper is that improving the identification, articulation and consideration of city and airport interests in the development approval process (between planning and implementation) can help avoid outcomes that hinder the ability of cities and their airports to meet their separate/mutual long-term objectives. By applying a network governance perspective to the pilot case study of Brisbane, analysis of overlapping and competing actor interests show how different governance arrangements facilitate (or impede) decision making that protects sustainable ‘airport region’ development. ---------- Contributions are made to airport and city development decision makers through the identification and analysis of effective and ineffective decision making pathways, and to governance literature by way of forwarding empirically derived frameworks for showing how actors protect their interests in the ‘crowded decision making domain’ of airport region development. This work was carried out through the Airport Metropolis Research Project under the Australian Research Council’s Linkage Projects funding scheme (LP0775225).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Is there a role for prototyping (sketching, pattern making and sampling) in addressing real world problems of sustainability (People, Profit, and Planet), in this case social/healthcare issues, through fashion and textiles research? Skin cancer and related illnesses are a major cause of disfigurement and death in New Zealand and Australia where the rates of Melanoma, a serious form of skin cancer, are four times higher than in the Northern Hemisphere regions of USA, UK and Canada (IARC, 1992). In 2007, AUT University (Auckland University of Technology) Fashion Department and the Health Promotion Department of Cancer Society - Auckland Division (CSA) developed a prototype hat aimed at exploring a barrier type solution to prevent facial and neck skin damage. This is a paradigm shift from the usual medical research model. This paper provides an overview of the project and examines how a fashion prototype has been used to communicate emergent social, environmental, personal, physiological and technological concerns to the trans-disciplinary research team. The authors consider how the design of a product can enhance and support sustainable design practice while contributing a potential solution to an ongoing health issue. Analysis of this case study provides an insight into prototyping in fashion and textiles design, user engagement and the importance of requirements analysis in relation to sustainable development. The analysis and a successful outcome of the final prototype have provided a gateway to future collaborative research and product development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On the theme of personal development, this conceptual article aims to provoke thought about power and influence in leadership by means of a short excursion into character depictions in J.R.R Tolkien’s The Lord of the Rings (1966). It is said of mythopoeic literature, the genre of Tolkien’s work, that the very simplicity of the lens “pares away distractions,” “opens the way to unexpected connections,...[and] draws attention to alternative modes of being and thinking” (Greene, 1994, p. 457). Taking the liberty of perceived applicability of Tolkien’s literary genius to motifs on leadership, this article provokes thinking on what constitutes “real” power and influence in leadership. It is contended that demonstrating real power and influence in leadership lies not in coercive tactics of wielding power over others but in withholding usurping power to work with and enable others to achieve worthwhile ends.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.