985 resultados para Occupant protection devices.
Resumo:
Voltage unbalance is a major power quality problem in low voltage residential feeders due to the random location and rating of single-phase rooftop photovoltaic cells (PV). In this paper, two different improvement methods based on the application of series (DVR) and parallel (DSTATCOM) custom power devices are investigated to improve the voltage unbalance problem in these feeders. First, based on the load flow analysis carried out in MATLAB, the effectiveness of these two custom power devices is studied vis-à-vis the voltage unbalance reduction in urban and semi-urban/rural feeders containing rooftop PVs. Their effectiveness is studied from the installation location and rating points of view. Later, a Monte Carlo based stochastic analysis is carried out to investigate their efficacy for different uncertainties of load and PV rating and location in the network. After the numerical analyses, a converter topology and control algorithm is proposed for the DSTATCOM and DVR for balancing the network voltage at their point of common coupling. A state feedback control, based on pole-shift technique, is developed to regulate the voltage in the output of the DSTATCOM and DVR converters such that the voltage balancing is achieved in the network. The dynamic feasibility of voltage unbalance and profile improvement in LV feeders, by the proposed structure and control algorithm for the DSTATCOM and DVR, is verified through detailed PSCAD/EMTDC simulations.
Resumo:
This review examines the multiple levels of pre-existing immunity in the upper and lower female reproductive tract. In addition, we highlight the need for further research of innate and adaptive immune protection of mucosal surfaces in the female reproductive tract. Innate mechanisms include the mucus lining, a tight epithelial barrier and the secretion of antimicrobial peptides and cytokines by epithelial and innate immune cells. Stimulation of the innate immune system also serves to bridge the adaptive arm resulting in the generation of pathogen-specific humoral and cell-mediated immunity. Less understood are the multiple components that act in a coordinated way to provide a network of ongoing protection. Innate and adaptive immunity in the human female reproductive tract are influenced by the stage of menstrual cycle and are directly regulated by the sex steroid hormones, progesterone and estradiol. Furthermore, the effect of hormones on immunity is mediated both directly on immune and epithelial cells and indirectly by stimulating growth factor secretion from stromal cells. The goal of this review is to focus on the diverse aspects of the innate and adaptive immune systems that contribute to a unique network of protection throughout the female reproductive tract.
Resumo:
The immune system in the female reproductive tract (FRT) does not mount an attack against HIV or other sexually transmitted infections (STI) with a single endogenously produced microbicide or with a single arm of the immune system. Instead, the body deploys dozens of innate antimicrobials to the secretions of the female reproductive tract. Working together, these antimicrobials along with mucosal antibodies attack many different viral, bacterial and fungal targets. Within the FRT, the unique challenges of protection against sexually transmitted pathogens coupled with the need to sustain the development of an allogeneic fetus have evolved in such a way that sex hormones precisely regulate immune function to accomplish both tasks. The studies presented in this review demonstrate that estradiol and progesterone secreted during the menstrual cycle act both directly and indirectly on epithelial cells and other immune cells in the reproductive tract to modify immune function in a way that is unique to specific sites throughout the FRT. As presented in this review, studies from our laboratory and others demonstrate that the innate immune response is under hormonal control, varies with the stage of the menstrual cycle, and as such is suppressed at mid-cycle to optimize conditions for successful fertilization and pregnancy. In doing so, a window of STI vulnerability is created during which potential pathogens including HIV enter the reproductive tract to infect host targets.
Resumo:
In Australia, protection orders are a key legal response to domestic violence, and are often viewed as a way of providing for victim safety. For instance, recently the joint Australian and New South Wales Law Reform Commissions recommended that a common core purpose of all state and territory domestic violence legislation should be ‘to ensure or maximise the safety and protection of persons who fear or experience family violence’ (2010:Recommendation 7-4). Drawing and building upon prior research in Australia and the United States (‘US’), this paper uses comparative quantitative content analysis to assess the victim safety focus of domestic violence protection order legislation in each Australian state and territory. The findings of this analysis show that the Northern Territory, South Australia and Victoria ‘stand out’ from the other jurisdictions, having the highest victim safety focus in their legislation. However, there remains sizeable scope for improvement in all Australian jurisdictions, in terms of the victim safety focus of their legislative provisions and the considerations of legislative inconsistency between jurisdictions.
Resumo:
The United Nations High Commissioner for Refugees' (UNHCR) 2011 statistics on refugee populations residing by region are a stark reminder of the challenge facing states and civil society in the Asia Pacific. In 2011, Africa hosted 2,149,000 refugees; the Americas, Europe, and Middle East and North Africa hosted 513 ,500, 1,605,500 and 1,889,900 respectively, while the Asia Pacific hosted a staggering 3,793,900. The fact that 35 per cent of the world's refugees reside in the Asia Pacific, coupled with the fact that 84 per cent of refugees displaced in Asia remain in the region,raises the questions why so few countries in the region are signatories to the Convention relating to the Status of Refugees ('Refugee Convention') or cognate rights instruments and why no formally binding regional agreement exists for the equitable sharing of responsibilities for refugees...
Resumo:
Despite the predictions, the true potential of Nb2O5 for electrochromic applications has yet to be fully realized. In this work, three-dimensional (3D) compact and well-ordered nanoporous Nb2O5 films are synthesized by the electrochemical anodization of niobium thin films. These films are formed using RF sputtering and then anodized in an electrolyte containing ethylene glycol, ammonium fluoride, and small water content (4%) at 50 °C which resulted in low embedded impurities within the structure. Characterization of the anodized films shows that a highly crystalline orthorhombic phase of Nb2O5 is obtained after annealing at 450 °C. The 3D structure provides a template consisting of a large concentration of active sites for ion intercalation, while also ensuring low scattering directional paths for electrons. These features enhance the coloration efficiency to 47.0 cm2 C?1 (at 550 nm) for a 500 nm thick film upon Li+ ion intercalation. Additionally, the Nb2O5 electrochromic device shows a high bleached state transparency and large optical modulation.
Resumo:
In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
We introduce the idea of geo-locking through a mobile phone based photo sharing application called Picalilly (figure 1). Using its geo-locking feature, Picalilly allows its users to manually define geographical boundaries for sharing photos -- limiting sharing within user-defined boundaries as well as facilitating open sharing between strangers within such boundaries. To explore the potential of geo-locking, we carried out a small scale field trial of Picalilly involving two groups of students, who were part of a two-week long introduction program at a university. Our preliminary results show that Picalilly facilitated 1) sharing of 'places' and 2) localized explorations.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.
Resumo:
Current military conflicts are characterized by the use of the improvised explosive device. Improvements in personal protection, medical care, and evacuation logistics have resulted in increasing numbers of casualties surviving with complex musculoskeletal injuries, often leading to lifelong disability. Thus, there exists an urgent requirement to investigate the mechanism of extremity injury caused by these devices in order to develop mitigation strategies. In addition, the wounds of war are no longer restricted to the battlefield; similar injuries can be witnessed in civilian centers following a terrorist attack. Key to understanding such mechanisms of injury is the ability to deconstruct the complexities of an explosive event into a controlled, laboratory-based environment. In this article, a traumatic injury simulator, designed to recreate in the laboratory the impulse that is transferred to the lower extremity from an anti-vehicle explosion, is presented and characterized experimentally and numerically. Tests with instrumented cadaveric limbs were then conducted to assess the simulator’s ability to interact with the human in two mounting conditions, simulating typical seated and standing vehicle passengers. This experimental device will now allow us to (a) gain comprehensive understanding of the load-transfer mechanisms through the lower limb, (b) characterize the dissipating capacity of mitigation technologies, and (c) assess the bio-fidelity of surrogates.
Resumo:
Background Improvised explosive devices have become the characteristic weapon of conflicts in Iraq and Afghanistan. While little can be done to mitigate against the effects of blast in free-field explosions, scaled blast simulations have shown that the combat boot can attenuate the effects on the vehicle occupants of anti-vehicular mine blasts. Although the combat boot offers some protection to the lower limb, its behaviour at the energies seen in anti-vehicular mine blast has not been documented previously. Methods The sole of eight same-size combat boots from two brands currently used by UK troops deployed to Iraq and Afghanistan were impacted at energies of up to 518 J, using a spring-assisted drop rig. Results The results showed that the Meindl Desert Fox combat boot consistently experienced a lower peak force at lower impact energies and a longer time-to-peak force at higher impact energies when compared with the Lowa Desert Fox combat boot. Discussion This reduction in the peak force and extended rise time, resulting in a lower energy transfer rate, is a potentially positive mitigating effect in terms of the trauma experienced by the lower limb. Conclusion Currently, combat boots are tested under impact at the energies seen during heel strike in running. Through the identification of significantly different behaviours at high loading, this study has shown that there is rationale in adding the performance of combat boots under impact at energies above those set out in international standards to the list of criteria for the selection of a combat boot.
Resumo:
Lower extremities are particularly susceptible to injury in an under‐vehicle explosion. Operational fitness of military vehicles is assessed through anthropometric test devices (ATDs) in full‐scale blast tests. The aim of this study was to compare the response between the Hybrid‐III ATD, the MiL‐Lx ATD and cadavers in our traumatic injury simulator, which is able to replicate the response of the vehicle floor in an under‐vehicle explosion. All specimens were fitted with a combat boot and tested on our traumatic injury simulator in a seated position. The load recorded in the ATDs was above the tolerance levels recommended by NATO in all tests; no injuries were observed in any of the 3 cadaveric specimens. The Hybrid‐III produced higher peak forces than the MiL‐Lx. The time to peak strain in the calcaneus of the cadavers was similar to the time to peak force in the ATDs. Maximum compression of the sole of the combat boot was similar for cadavers and MiL‐Lx, but significantly greater for the Hybrid‐III. These results suggest that the MiL‐Lx has a more biofidelic response to under‐vehicle explosive events compared to the Hybrid‐III. Therefore, it is recommended that mitigation strategies are assessed using the MiL‐Lx surrogate and not the Hybrid‐III.
Resumo:
"Combining facets of health physics with medicine, An Introduction to Radiation Protection in Medicine covers the background of the subject and the medical situations where radiation is the tool to diagnose or treat human disease. Encouraging newcomers to the field to properly and efficiently function in a versatile and evolving work setting, it familiarizes them with the particular problems faced during the application of ionizing radiation in medicine. The text builds a fundamental knowledge base before providing practical descriptions of radiation safety in medicine. It covers basic issues related to radiation protection, including the physical science behind radiation protection and the radiobiological basis of radiation protection. The text also presents operational and managerial tools for organizing radiation safety in a medical workplace. Subsequent chapters form the core of the book, focusing on the practice of radiation protection in different medical disciplines. They explore a range of individual uses of ionizing radiation in various branches of medicine, including radiology, nuclear medicine, external beam radiotherapy, and brachytherapy. With contributions from experienced practicing physicists, this book provides essential information about dealing with radiation safety in the rapidly shifting and diverse environment of medicine."--publisher website
Resumo:
Oral endotracheal tubes (ETTs) and nasogastric tubes (NGT) are common devices used in adult intensive care and numerous options exist for safe and comfortable securement of these devices. The aim of this project was to identify the available range of ETT and NGT securement devices in Australia as a resource for clinicians seeking to explore options for tube stabilisation. This article reports part A of this project: ETT securement options. Part B will report NGT device fixation options. Securing ETTs to ensure a patent airway with minimal ETT movement, promotion of patient comfort and absence of adverse events such as ETT dislodgement, unplanned extubation and device-related injury1, are essential critical care nursing actions. The ETT requires a fixation method that is robust yet does not traumatise or injure the mucosal tissues of the mouth and soft tissue of the lips.2,3 Choice of a securement apparatus is often determined by product availability in our units or hospitals but is also driven by evidence-based practice and clinician preference. Trying to put this information together can be difficult and time-consuming for the bedside clinician...