920 resultados para Combined sewer overflows.
Resumo:
Typical daily decision-making process of individuals regarding use of transport system involves mainly three types of decisions: mode choice, departure time choice and route choice. This paper focuses on the mode and departure time choice processes and studies different model specifications for a combined mode and departure time choice model. The paper compares different sets of explanatory variables as well as different model structures to capture the correlation among alternatives and taste variations among the commuters. The main hypothesis tested in this paper is that departure time alternatives are also correlated by the amount of delay. Correlation among different alternatives is confirmed by analyzing different nesting structures as well as error component formulations. Random coefficient logit models confirm the presence of the random taste heterogeneity across commuters. Mixed nested logit models are estimated to jointly account for the random taste heterogeneity and the correlation among different alternatives. Results indicate that accounting for the random taste heterogeneity as well as inter-alternative correlation improves the model performance.
Resumo:
Australian queer (GLBTIQ) university student media is an important site of cultural and political self-representation. These groups exist within university student unions and the unions provide them with space, financial support and resources. Community media is a significant site for the development of queer identity, community and a key part of queer politics. This paper reviews my research into queer community media which is grounded in a Queer Theoretical perspective of identity performativity. Cover argues that Queer Theoretical approaches that study media products fail to consider the material contexts which contribute to their construction. I use an ethnographic approach combined with discourse analysis in order to reveal queer student activists’ media representations of queer, and the production contexts which shape them. My research contributes to queer media scholarship by using a methodology to address the gap that Cover identifies.
Resumo:
Introduction and aims: For a scaffold material to be considered effective and efficient for tissue engineering it must be biocompatible as well as bioinductive. Silk fiber is a natural biocompatible material suitable for scaffold fabrication; however, silk is tissue-conductive and lacks tissue-inductive properties. One proposed method to make the scaffold tissue-inductive is to introduce plasmids or viruses encoding a specific growth factor into the scaffold. In this study, we constructed adenoviruses encoding bone morphogenetic protein-7 (BMP-7) and incorporated these into silk scaffolds. The osteo-inductive and new bone formation properties of these constructs were assessed in vivo in a critical-sized skull defect animal model. Materials and methods: Silk fibroin scaffolds containing adenovirus particles coding BMP-7 were prepared. The release of the adenovirus particles from the scaffolds was quantified by tissue-culture infective dose (TCID50) and the bioactivity of the released viruses was evaluated on human bone marrow mesenchymal stromal cells (BMSCs). To demonstrate the in vivo bone forming ability of the virus-carrying silk fibroin scaffold, the scaffold constructs were implanted into calvarial defects in SCID mice. Results: In vitro studies demonstrated that the virus-carrying silk fibroin scaffold released virus particles over a 3 week period while preserving their bioactivity. In vivo test of the scaffold constructs in critical-sized skull defect areas revealed that silk scaffolds were capable of delivering the adenovirus encoding BMP-7, resulting significantly enhanced new bone formation. Conclusions: Silk scaffolds carrying BMP-7 encoding adenoviruses can effectively transfect cells and enhance both in vitro and in vivo osteogenesis. The findings of this study indicate silk fibroin is a promising biomaterial for gene delivery to repair critical-sized bone defects.
Resumo:
We present a novel method and instrument for in vivo imaging and measurement of the human corneal dynamics during an air puff. The instrument is based on high-speed swept source optical coherence tomography (ssOCT) combined with a custom adapted air puff chamber from a non-contact tonometer, which uses an air stream to deform the cornea in a non-invasive manner. During the short period of time that the deformation takes place, the ssOCT acquires multiple A-scans in time (M-scan) at the center of the air puff, allowing observation of the dynamics of the anterior and posterior corneal surfaces as well as the anterior lens surface. The dynamics of the measurement are driven by the biomechanical properties of the human eye as well as its intraocular pressure. Thus, the analysis of the M-scan may provide useful information about the biomechanical behavior of the anterior segment during the applanation caused by the air puff. An initial set of controlled clinical experiments are shown to comprehend the performance of the instrument and its potential applicability to further understand the eye biomechanics and intraocular pressure measurements. Limitations and possibilities of the new apparatus are discussed.
Resumo:
We present here a numerical study of laminar doubly diffusive free convection flows adjacent to a vertical surface in a stable thermally stratified medium. The governing equations of mass, momentum, energy and species are non-dimensionalized. These equations have been solved by using an implicit finite difference method and local non-similarity method. The results show many interesting aspects of complex interaction of the two buoyant mechanisms that have been shown in both the tabular as well as graphical form.
Resumo:
A time-resolved inverse spatially offset Raman spectrometer was constructed for depth profiling of Raman-active substances under both the lab and the field environments. The system operating principles and performance are discussed along with its advantages relative to traditional continuous wave spatially offset Raman spectrometer. The developed spectrometer uses a combination of space- and time-resolved detection in order to obtain high-quality Raman spectra from substances hidden behind coloured opaque surface layers, such as plastic and garments, with a single measurement. The time-gated spatially offset Raman spectrometer was successfully used to detect concealed explosives and drug precursors under incandescent and fluorescent background light as well as under daylight. The average screening time was 50 s per measurement. The excitation energy requirements were relatively low (20 mW) which makes the probe safe for screening hazardous substances. The unit has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than previous picosecond-based systems, to provide a functional platform for in-line or in-field sensing of chemical substances.
Resumo:
In this paper, No-Wait, No-Buffer, Limited-Buffer, and Infinite-Buffer conditions for the flow-shop problem (FSP) have been investigated. These four different buffer conditions have been combined to generate a new class of scheduling problem, which is significant for modelling many real-world scheduling problems. A new heuristic algorithm is developed to solve this strongly NP-hard problem. Detailed numerical implementations have been analysed and promising results have been achieved.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.