990 resultados para Cenozoic covers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The International Road Assessment Program (iRAP) is a not-for-profit organisation that works in partnership with governments and non-government organisations in all parts of the world to make roads safe. The iRAP Malaysia pilot study on 3700km of road identified the potential to prevent 31,800 deaths and serious injuries over the next 20 years from proven engineering improvements. To help ensure the iRAP data and results are available to planners and engineers, iRAP, together with staff from the Centre for Accident Research and Road Safety – Queensland (CARRS-Q) and the Malaysian Institute of Road Safety Research (MIROS), developed a five-day iRAP training course that covers the background, theory and practical application of iRAP protocols, with a special focus on Malaysian case studies. Funding was provided by a competitive grant from the Australia-Malaysia Institute.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In asset intensive industries such as mining, oil & gas, utilities etc. most of the capital expenditure happens on acquiring engineering assets. Process of acquiring assets is called as “Procurement” or “Acquisition”. An asset procurement decision should be taken in consideration with the installation, commissioning, operational, maintenance and disposal needs of an asset or spare. However, such cross-functional collaboration and communication does not appear to happen between engineering, maintenance, warehousing and procurement functions in many asset intensive industries. Acquisition planning and execution are two distinct parts of asset acquisition process. Acquisition planning or procurement planning is responsible for determining exactly what is required to be purchased. It is important that an asset acquisition decision is the result of cross-functional decision making process. An acquisition decision leads to a formal purchase order. Most costly asset decisions occur even before they are acquired. Therefore, acquisition decision should be an outcome of an integrated planning & decision making process. Asset intensive organizations both, Government and non Government in Australia spent AUD 102.5 Billion on asset acquisition in year 2008-09. There is widespread evidence of many assets and spare not being used or utilized and in the end are written off. This clearly shows that many organizations end up buying assets or spares which were not required or non-conforming to the needs of user functions. It is due the fact that strategic and software driven procurement process do not consider all the requirements from various functions within the organization which contribute to the operation and maintenance of the asset over its life cycle. There is a lot of research done on how to implement an effective procurement process. There are numerous software solutions available for executing a procurement process. However, not much research is done on how to arrive at a cross functional procurement planning process. It is also important to link procurement planning process to procurement execution process. This research will discuss ““Acquisition Engineering Model” (AEM) framework, which aims at assisting acquisition decision making based on various criteria to satisfy cross-functional organizational requirements. Acquisition Engineering Model (AEM) will consider inputs from corporate asset management strategy, production management, maintenance management, warehousing, finance and HSE. Therefore, it is essential that the multi-criteria driven acquisition planning process is carried out and its output is fed to the asset acquisition (procurement execution) process. An effective procurement decision making framework to perform acquisition planning which considers various functional criteria will be discussed in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines one of the changes implemented in the Corporations Amendment (Insolvency) Act 2007 (Cth) . It is argued that the insertion of s 444DA raises some matters that go to the nature of the insolvency process generally and the operation of Pt 5.3A in a particular. The position of employees in insolvency is a matter that is the subject of much comment from a policy perspective. This article does not cover that debate but provides some initial explanation of the need to protect employees. The second part of the article covers the particular background to the voluntary administration system as far as employee rights are concerned as well as the arguments put forward by the government to justify the change in the legislation which inserted s 444DA . It suggests that there was little evidence provided for the need to protect employee priority rights in this particular way. An alternative explanation is given for the change adopted by the government. The third part of the article suggests that the manner in which the legislation seeks to better protect employee creditors is somewhat clumsy in its operation. It raises a number of questions about how the legislation may operate and argues that given the stated aims, some alteration to it would improve its effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bus Rapid Transit (BRT), because of its operational flexibility and simplicity, is rapidly gaining popularity with urban designers and transit planners. Earlier BRTs were bus shared lane or bus only lane, which share the roadway with general and other forms of traffic. In recent time, more sophisticated designs of BRT have emerged, such as busway, which has separate carriageway for buses and provides very high physical separation of buses from general traffic. Line capacities of a busway are predominately dependent on bus capacity of its stations. Despite new developments in BRT designs, the methodology of capacity analysis is still based on traditional principles of kerbside bus stop on bus only lane operations. Consequently, the tradition methodology lacks accounting for various dimensions of busway station operation, such as passenger crowd, passenger walking and bus lost time along the long busway station platform. This research has developed a purpose made bus capacity analysis methodology for busway station analysis. Extensive observations of kerbside bus stops and busway stations in Brisbane, Australia were made and differences in their operation were studied. A large scale data collection was conducted using the video recording technique at the Mater Hill Busway Station on the South East Busway in Brisbane. This research identified new parameters concerning busway station operation, and through intricate analysis identified the elements and processes which influence the bus dwell time at a busway station platform. A new variable, Bus lost time, was defined and its quantitative descriptions were established. Based on these finding and analysis, a busway station platform bus capacity methodology was developed, comprising of new models for busway station lost time, busway station dwell time, busway station loading area bus capacity, and busway station platform bus capacity. The new methodology not only accounts for passenger boarding and alighting, but also covers platform crowd and bus lost time in station platform bus capacity estimation. The applicability of this methodology was shown through demonstrative examples. Additionally, these examples illustrated the significance of the bus lost time variable in determining station capacities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The practice of robotics and computer vision each involve the application of computational algorithms to data. The research community has developed a very large body of algorithms but for a newcomer to the field this can be quite daunting. For more than 10 years the author has maintained two open-source MATLAB® Toolboxes, one for robotics and one for vision. They provide implementations of many important algorithms and allow users to work with real problems, not just trivial examples. This new book makes the fundamental algorithms of robotics, vision and control accessible to all. It weaves together theory, algorithms and examples in a narrative that covers robotics and computer vision separately and together. Using the latest versions of the Toolboxes the author shows how complex problems can be decomposed and solved using just a few simple lines of code. The topics covered are guided by real problems observed by the author over many years as a practitioner of both robotics and computer vision. It is written in a light but informative style, it is easy to read and absorb, and includes over 1000 MATLAB® and Simulink® examples and figures. The book is a real walk through the fundamentals of mobile robots, navigation, localization, arm-robot kinematics, dynamics and joint level control, then camera models, image processing, feature extraction and multi-view geometry, and finally bringing it all together with an extensive discussion of visual servo systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we seek to expand the use of direct methods in real-time applications by proposing a vision-based strategy for pose estimation of aerial vehicles. The vast majority of approaches make use of features to estimate motion. Conversely, the strategy we propose is based on a MR (Multi- Resolution) implementation of an image registration technique (Inverse Compositional Image Alignment ICIA) using direct methods. An on-board camera in a downwards-looking configuration, and the assumption of planar scenes, are the bases of the algorithm. The motion between frames (rotation and translation) is recovered by decomposing the frame-to-frame homography obtained by the ICIA algorithm applied to a patch that covers around the 80% of the image. When the visual estimation is required (e.g. GPS drop-out), this motion is integrated with the previous known estimation of the vehicles’ state, obtained from the on-board sensors (GPS/IMU), and the subsequent estimations are based only on the vision-based motion estimations. The proposed strategy is tested with real flight data in representative stages of a flight: cruise, landing, and take-off, being two of those stages considered critical: take-off and landing. The performance of the pose estimation strategy is analyzed by comparing it with the GPS/IMU estimations. Results show correlation between the visual estimation obtained with the MR-ICIA and the GPS/IMU data, that demonstrate that the visual estimation can be used to provide a good approximation of the vehicle’s state when it is required (e.g. GPS drop-outs). In terms of performance, the proposed strategy is able to maintain an estimation of the vehicle’s state for more than one minute, at real-time frame rates based, only on visual information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stephen Page talking with Cheryl Stock Stephen Page is one of the most significant dance artists working in Australia today, unique in his ability to forge and sustain a company of Indigenous artists through his seminal leadership of Bangarra Dance Theatre, which celebrated its 20 year anniversary in 2009. Together with the many artists who have contributed to the Bangarra vision, Stephen has created a distinctive contemporary Indigenous dance style and approach, celebrated for the stories it tells of the Aboriginal and Torres Strait Islander experience. Fusing the traditional with the contemporary through a connection to the spirit of the land and its people, Stephen has inspired and influenced a generation of Aboriginal and Torres Strait Islander dance and theatre artists as a choreographer, director and mentor. His down to earth humour, his passion and his sensitivity draw us as audience, Indigenous and non-Indigenous alike, to his theatrical stories of place and spirit – both ancient and modern – in ways that simultaneously transcend and reaffirm the particular cultural experience which informs them. This conversation covers the early years of growing up with his 'urban clan', discovering dance and politics and his spiritual awakening at Yirrkala. Stephen then describes moving in and out of different realities as a member of Sydney Dance Company whilst simultaneously exploring his Indigenous dance voice, the transition from dancer to choreographer, creating the Bangarra identity and the intercultural experiment of 'Rites' with the Australian Ballet. The last section looks at his various roles as an artistic director and nurturing the next generation of Indigenous artists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the fourth in a series of reviews of cross-cultural studies of menopausal symptoms. The purpose of this review is to examine methods used in cross-cultural comparisons of sexual symptoms among women at midlife, and to examine the determinants of sexual symptoms and how those determinants were measured. The goal of this review is to make recommendations that will improve cross-cultural comparisons in the future. The review included nine studies that explicitly examined symptoms in different countries or different ethnic groups in the same country and included: Australian/Japanese Midlife Women's Health Study (AJMWHS), Decisions At Menopause Study (DAMeS), Four Major Ethnic Groups (FMEG), Hilo Women's Health Survey (HWHS), Mid-Aged Health in Women from the Indian Subcontinent (MAHWIS), Penn Ovarian Aging Study (POAS), Study of Women's Health Across the Nation (SWAN), Women's Health in Midlife National Study (WHiMNS), and Women's International Study of Health and Sexuality (WISHeS). Although methods used for assessing sexual symptoms across cultures differed between studies, statistically significant differences were reported. Cross-cultural differences in sexual symptoms exist, and should be measured by including the following symptoms: loss of interest in sex, vaginal dryness, and the Females Sexual Function Index which covers desire, arousal, lubrication, orgasm, satisfaction, and pain on intercourse. The measurement of these symptoms will provide an evidence-based approach when forming any future menopause symptom list and allow for comparisons across studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Crime: Local and Global covers the way local events (such as prostitution) have wider aspects than previously thought. Links with people traffickers, international organised crime and violence cannot be ignored any longer. Each crime or area of activity selected within this text has a global reach, and is made ever more possible due to the way globalisation has opened up markets, both legitimate and illegitimate. The book's approach and scope emphasises that we can no longer view 'crime' as something which occurs within certain jurisdictions, at certain times and in particular places. For example, the chapter on cybercrime highlights the 'illegal' acts that can be perpetrated by second lifers, anywhere in the world, but are they a crime?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A modified microstrip-fed planar monopole antenna with open circuited coupled line is presented in this paper. The operational bandwidth of the proposed antenna covers the 2.4 GHz ISM band (2.42-2.48 GHz) and the 5 GHz WLAN band (5 GHz to 6 GHz). The radiating elements occupy a small area of 23×8 mm2. The Finite Difference Time Domain method is used to predict the input impedance of the antenna. The calculated return loss shows very good agreement with measured data. Reasonable antenna gain is observed across the operating band. The measured radiation patterns are similar to those of a simple monopole antenna.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Blooms of the toxic cyanobacterium majuscula Lyngbya in the coastal waters of southeast Queensland have caused adverse impacts on both environmental health and human health, and on local economies such as fishing and tourism. A number of studies have confirmed that the main limiting nutrients (“nutrients of concern”) that contribute to these blooms area Fe, DOC, N, P and also pH. This study is conducted to establish the distribution of these parameters in a typical southeast Queensland coastal setting. The study maps the geochemistry of shallow groundwater in the mainland Pumicestone catchment with an emphasis on the nutrients of concern to understand how these nutrients relate to aquifer materials, landuse and anthropogenic activities. The results of the study form a GIS information layer which will be incorporated into a larger GIS model being produced by Queensland Department of Environment and Resource Management (DERM) to support landuse management to avoid/minimize blooms of Lyngbya in Moreton Bay, southeast Queensland, and other similar settings. A total of 38 boreholes were established in the mainland Pumicestone region and four sampling rounds of groundwater carried out in both dry and wet conditions. These groundwater samples were measured in the field for physico-chemical parameters, and in the laboratory analyses for the nutrients of concern, and other major and minor ions. Aquifer materials were confirmed using the Geological Survey of Queensland digital geology map, and geomaterials were assigned to seven categories which are A (sands), B (silts, sandy silts), C (estuarine mud, silts), D (humid soils), E (alluvium), F (sandstone) and G (other bedrock). The results of the water chemistry were examined by use of the software package AquaChem/AqQA, and divided into six groundwater groups, based on groundwater chemical types and location of boreholes. The type of aquifer material and location, and proximity to waterways was found to be important because they affected physico-chemical properties and concentrations of nutrients of concern and dissolved ions. The analytical results showed that iron concentrations of shallow groundwaters were high due to acid sulfate soils, and also mud and silt, but were lower in sand materials. DOC concentrations of these shallow groundwaters in the sand material were high probably due to rapid infiltration. In addition, DOC concentrations in some boreholes were high because they were installed in organic rich wetlands. The pH values of boreholes were from acidic to near neutral; some boreholes with pH values were low (< 4), showing acid sulfate soils in these boreholes. Concentrations of total nitrogen and total phosphorus of groundwaters were generally low, and the main causes of elevated concentrations of total nitrogen and total phosphorus are largely due to animal and human wastes and tend to be found in localized source areas. Comparison of the relative percentage of nitrogen species (NH3/NH4< Org-N, NO3-N and NO2-N) demonstrated that they could be related to sources such as animal waste, residential and agricultural fertilizers, forest and vegetation, mixed residents and farms, and variable setting and vegetation covers. Total concentrations of dissolved ions in sampling round 3 (dry period) were higher than those in sampling round 2 (wet period) due to both evaporation of groundwater in the dry period and the dilution of rainfall in the wet period. This showed that the highest concentrations of nutrients of concern were due to acid sulfate soils, aquifer materials, landuse and anthropogenic activities and were typically in aquifer materials of E (alluvium) and C (estuarine muds) and locations of Burpengary, Caboolture, and Glass Mountain catchments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the large diffusion of Business Process Managemen (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.