991 resultados para Flood Proof Design
Resumo:
Caption title.
Resumo:
The second generation of large scale interferometric gravitational wave (GW) detectors will be limited by quantum noise over a wide frequency range in their detection band. Further sensitivity improvements for future upgrades or new detectors beyond the second generation motivate the development of measurement schemes to mitigate the impact of quantum noise in these instruments. Two strands of development are being pursued to reach this goal, focusing both on modifications of the well-established Michelson detector configuration and development of different detector topologies. In this paper, we present the design of the world's first Sagnac speed meter (SSM) interferometer, which is currently being constructed at the University of Glasgow. With this proof-of-principle experiment we aim to demonstrate the theoretically predicted lower quantum noise in a Sagnac interferometer compared to an equivalent Michelson interferometer, to qualify SSM for further research towards an implementation in a future generation large scale GW detector, such as the planned Einstein telescope observatory.
Resumo:
The purpose of this proof-of-concept study was to determine the relevance of direct measurements to monitor the load applied on the osseointegrated fixation of transfemoral amputees during static load bearing exercises. The objectives were (A) to introduce an apparatus using a three-dimensional load transducer, (B) to present a range of derived information relevant to clinicians, (C) to report on the outcomes of a pilot study and (D) to compare the measurements from the transducer with those from the current method using a weighing scale. One transfemoral amputee fitted with an osseointegrated implant was asked to apply 10 kg, 20 kg, 40 kg and 80 kg on the fixation, using self-monitoring with the weighing scale. The loading was directly measured with a portable kinetic system including a six-channel transducer, external interface circuitry and a laptop. As the load prescribed increased from 10 kg to 80 kg, the forces and moments applied on and around the antero-posterior axis increased by 4 fold anteriorly and 14 fold medially, respectively. The forces and moments applied on and around the medio-lateral axis increased by 9 fold laterally and 16 fold from anterior to posterior, respectively. The long axis of the fixation was overloaded and underloaded in 17 % and 83 % of the trials, respectively, by up to ±10 %. This proof-of-concept study presents an apparatus that can be used by clinicians facing the challenge of improving basic knowledge on osseointegration, for the design of equipment for load bearing exercises and for rehabilitation programs.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.
Resumo:
Bana et al. proposed the relation formal indistinguishability (FIR), i.e. an equivalence between two terms built from an abstract algebra. Later Ene et al. extended it to cover active adversaries and random oracles. This notion enables a framework to verify computational indistinguishability while still offering the simplicity and formality of symbolic methods. We are in the process of making an automated tool for checking FIR between two terms. First, we extend the work by Ene et al. further, by covering ordered sorts and simplifying the way to cope with random oracles. Second, we investigate the possibility of combining algebras together, since it makes the tool scalable and able to cover a wide class of cryptographic schemes. Specially, we show that the combined algebra is still computationally sound, as long as each algebra is sound. Third, we design some proving strategies and implement the tool. Basically, the strategies allow us to find a sequence of intermediate terms, which are formally indistinguishable, between two given terms. FIR between the two given terms is then guaranteed by the transitivity of FIR. Finally, we show applications of the work, e.g. on key exchanges and encryption schemes. In the future, the tool should be extended easily to cover many schemes. This work continues previous research of ours on use of compilers to aid in automated proofs for key exchange.
Resumo:
After state-wide flooding and a category-5 tropical cyclone, three-quarters of the state of Queensland was declared a disaster zone in early 2011. This deluge of adversity had a significant impact on university students, a few weeks prior to the start of the academic semester. The purpose of this paper is to examine the role that design plays in facilitating students to understand and respond to, adversity. The participants of this study were second and fourth year architectural design students at a large Australian University, in Queensland. As a part of their core architectural design studies, students were required to provide architectural responses to the recent catastrophic events in Queensland. Qualitative data was obtained through student surveys, work design work submitted by students and a survey of guests who attending an exhibition of the student work. The results of this research showed that the students produced more than just the required set of architectural drawings, process journals and models, but also recognition of the important role that the affective dimension of the flooding event and the design process played in helping them to both understand and respond to, adversity. They held the ‘real world’ experience and practical aspect of the assessment in higher regard than their typical focus on aesthetics and the making of iconic design. Perhaps most importantly, the students recognised that this process allowed them to have a voice, and a means to respond to adversity through the powerful language of design.
Resumo:
A practical method for the design of dual-band decoupling and matching networks (DMN) for two closely spaced antennas using discrete components is presented. The DMN reduces the port-to-port coupling and enhances the diversity of the antennas. By applying the DMN, the radiation efficiency can also be improved when one port is fed and the other port is match terminated. The proposed DMN works at two frequencies simultaneously without the need for any switch. As a proof of concept, a dual-band DMN for a pair of monopoles spaced 0.05λ apart is designed. The measured return loss and port isolation exceed 10 dB from 1.71 GHz to 1.76 GHz and from 2.27 GHz to 2.32 GHz.
Resumo:
This paper presents an approach to modelling the resilience of a generic (potable) water supply system. The system is contextualized as a meta-system consisting of three subsystems to represent the natural catchment, the water treatment plant and the water distribution infrastructure for urban use. An abstract mathematical model of the meta-system is disaggregated progressively to form a cascade of equations forming a relational matrix of models. This allows the investigation of commonly implicit relationships between various operational components within the meta system, the in-depth understanding of specific system components and influential factors and the incorporation of explicit disturbances to explore system behaviour. Consequently, this will facilitate long-term decision making to achieve sustainable solutions for issues such as, meeting a growing demand or managing supply-side influences in the meta-system under diverse water availability regimes. This approach is based on the hypothesis that the means to achieve resilient supply of water may be better managed by modelling the effects of changes at specific levels that have a direct or in some cases indirect impact on higher-order outcomes. Additionally, the proposed strategy allows the definition of approaches to combine disparate data sets to synthesise previously missing or incomplete higher-order information, a scientifically robust means to define and carry out meta-analyses using knowledge from diverse yet relatable disciplines relevant to different levels of the system and for enhancing the understanding of dependencies and inter-dependencies of variable factors at various levels across the meta-system. The proposed concept introduces an approach for modelling a complex infrastructure system as a meta system which consists of a combination of bio-ecological, technical and socio-technical subsystems.
Resumo:
The Bouncing Back Project, which began after the Queensland flood event in January 2011, has organically grown through a number of reiterations as per the diagram above. In the August 2011 it resulted in the physical construction of an Emergency Shelter [designed by GreenLeaf Engineers] in Sydney at the Customs House in Circular Quay and a conference paper publication at the AASA conference. To date this research has progressed without any research grant funding and has resulted in significant media interest. During the construction of the Emergency Shelter we collected a wide range of multimedia data which is being compilled into a documentary focusing on the architecture students’ experience throughout the iterations of Bouncing Back.
Resumo:
Architectural education is beginning to recognise the potential of a more intensive relationship between the tasks of designing and building (Erdman et al., 2002) within a work integrated learning environment. The Bouncing Back Project, began after the Queensland, Australia floods in January 2011, and has organically grown through a number of architectural student exhibitions, initially displaying flood responsive designs. In September 2011, 10 Queensland University of Technology architecture students travelled to Sydney to work together in helping to construct a shelter in the Emergency Shelter Exhibition, at Customs House in Circular Quay. The construction and making of the shelter, was filmed. This film documents the student experience, of making, working with industry professionals, community engagement and it reveals how this activity promotes informal work integrated learning in a real world context.
Resumo:
Fluid Infrastructure: Landscape Architecture Exhibition: This exhibition showcases the work of 4th Year undergraduate landscape architecture students in response to the 2011 Queensland floods through five installations: Systima Fluid Flux Flex Fluid Connectivity The Floods Verge Fluid Evolution The focus of these installations is the post-flood conditions of Brisbane’s riverside public infrastructure, within a scenario of flood as a normalised event. It recognises that within this scenario, parts of this city cannot be described as definitively ‘land’ or ‘water,’ but are best described as ‘fluid terrains’(Mathur, A. and Da Cunha, D. 2006). The landscape design propositions within the five installations include public transport diversification (RiverRats) schemes, greenspace elevations, ephemeral gardens and evolving landscapes, creative interpretation and warning devices and systems. These propositions do not resist fluid conditions, but work with them to propose a more resilient urban river landscape than Brisbane currently has. This QUT exhibition was developed as part of the 2011 Flood of Ideas Project (http://www.floodofideas.org.au) in partnership with Healthy Waterways (Water by Design), State Library of Queensland (The Edge), Brisbane City Council, Australian Institute of Architects, University of Queensland, Green Cross Australia, Stormwater Industry Association.
Resumo:
The mining equipment technology services sector is driven by a reactive and user-centered design approach, with a technological focus on incremental new product development. As Australia moves out of its sustained mining boom, companies need to rethink their strategic position, to become agile to stay relevant in an enigmatic market. This paper reports on the first five months on an embedded case study within an Australian, family-owned mining manufacturer. The first author is currently engaged in a longitudinal design led innovation project, as a catalyst to guide the company’s journey to design integration. The results find that design led innovation could act as a channel for highlighting and exploring company disconnections with the marketplace and offer a customer-centric catalyst for internal change. Data collected for this study is from 12 analysed semistructured interviews, a focus group and a reflective journal, over a five-month period. This paper explores limitations to design integration, and highlights opportunities to explore and leverage entrepreneurial characteristics to stay agile, broaden innovation and future-proof through the next commodity cycle in the mining industry.
Resumo:
In Victoria, as in other jurisdictions, there is very little research on the potential risks and benefits of lane filtering by motorcyclists, particularly from a road safety perspective. This on-road proof of concept study aimed to investigate whether and how lane filtering influences motorcycle rider situation awareness at intersections and to address factors that need to be considered for the design of a larger study in this area. Situation awareness refers to road users’ understanding of ‘what is going on’ around them and is a critical commodity for safe performance. Twenty-five experienced motorcyclists rode their own instrumented motorcycle around an urban test route in Melbourne whilst providing verbal protocols. Lane filtering occurred in 27% of 43 possible instances in which there were one or more vehicles in the traffic queue and the traffic lights were red on approach to the intersection. A network analysis procedure, based on the verbal protocols provided by motorcyclists, was used to identify differences in motorcyclist situation awareness between filtering and non-filtering events. Although similarities in situation awareness across filtering and nonfiltering motorcyclists were found, the analysis revealed some differences. For example, filtering motorcyclists placed more emphasis on the timing of the traffic light sequence and on their own actions when moving to the front of the traffic queue, whilst non-filtering motorcyclists paid greater attention to traffic moving through the intersection and approaching from behind. Based on the results of this study, the paper discusses some methodological and theoretical issues to be addressed in a larger study comparing situation awareness between filtering and non-filtering motorcyclists.
Resumo:
Floods through inundated urban environments constitute a hazard to the population and infrastructure. A series of field measurements were performed in an inundated section of the City of Brisbane (Australia) during a major flood in January 2011. Using an acoustic Doppler velocimeter (ADV), detailed velocity and suspended sediment concentration measurements were conducted about the peak of the flood. The results are discussed with a focus on the safety of individuals in floodwaters and the sediment deposition during the flood recession. The force of the floodwaters in Gardens Point Road was deemed unsafe for individual evacuation. A comparison with past laboratory results suggested that previous recommendations could be inappropriate and unsafe in real flood flows.