918 resultados para channel deepening baywide monitoring programs
Resumo:
Information behaviour (IB) is an area within Library and Information Science that studies the totality of human behaviour in relation to information, both active and passive, along with the explicit and the tacit mental states related to information. This study reports on a recently completed dissertation research that integrates the different models of information behaviours using a diary study where 34 participants maintained a daily journal for two weeks through a web log or paper diary. This resulted in thick descriptions of IB, which were manually analysed using the Grounded Theory method of inquiry, and then cross-referenced through both text-analysis and statistical analysis programs. Among the many key findings of this study, one is the focus this paper: how participants express their feelings of the information seeking process and their mental and affective states related specifically to the sense-making component which co-occurs with almost every other aspect of information behaviour. The paper title – Down the Rabbit Hole and Through the Looking Glass – refers to an observation that some of the participants made in their journals when they searched for, or avoided information, and wrote that they felt like they have fallen into a rabbit hole where nothing made sense, and reported both positive feelings of surprise and amazement, and negative feelings of confusion, puzzlement, apprehensiveness, frustration, stress, ambiguity, and fatigue. The study situates this sense-making aspects of IB within an overarching model of information behaviour that includes IB concepts like monitoring information, encountering information, information seeking and searching, flow, multitasking, information grounds, information horizons, and more, and proposes an integrated model of information behaviour illuminating how these different concepts are interleaved and inter-connected with each other, along with it's implications for information services.
Resumo:
Ocean processes are dynamic and complex events that occur on multiple different spatial and temporal scales. To obtain a synoptic view of such events, ocean scientists focus on the collection of long-term time series data sets. Generally, these time series measurements are continually provided in real or near-real time by fixed sensors, e.g., buoys and moorings. In recent years, an increase in the utilization of mobile sensor platforms, e.g., Autonomous Underwater Vehicles, has been seen to enable dynamic acquisition of time series data sets. However, these mobile assets are not utilized to their full capabilities, generally only performing repeated transects or user-defined patrolling loops. Here, we provide an extension to repeated patrolling of a designated area. Our algorithms provide the ability to adapt a standard mission to increase information gain in areas of greater scientific interest. By implementing a velocity control optimization along the predefined path, we are able to increase or decrease spatiotemporal sampling resolution to satisfy the sampling requirements necessary to properly resolve an oceanic phenomenon. We present a path planning algorithm that defines a sampling path, which is optimized for repeatability. This is followed by the derivation of a velocity controller that defines how the vehicle traverses the given path. The application of these tools is motivated by an ongoing research effort to understand the oceanic region off the coast of Los Angeles, California. The computed paths are implemented with the computed velocities onto autonomous vehicles for data collection during sea trials. Results from this data collection are presented and compared for analysis of the proposed technique.
Resumo:
Autonomous Underwater Vehicles (AUVs) are revolutionizing oceanography through their versatility, autonomy and endurance. However, they are still an underutilized technology. For coastal operations, the ability to track a certain feature is of interest to ocean scientists. Adaptive and predictive path planning requires frequent communication with significant data transfer. Currently, most AUVs rely on satellite phones as their primary communication. This communication protocol is expensive and slow. To reduce communication costs and provide adequate data transfer rates, we present a hardware modification along with a software system that provides an alternative robust disruption- tolerant communications framework enabling cost-effective glider operation in coastal regions. The framework is specifically designed to address multi-sensor deployments. We provide a system overview and present testing and coverage data for the network. Additionally, we include an application of ocean-model driven trajectory design, which can benefit from the use of this network and communication system. Simulation and implementation results are presented for single and multiple vehicle deployments. The presented combination of infrastructure, software development and deployment experience brings us closer to the goal of providing a reliable and cost-effective data transfer framework to enable real-time, optimal trajectory design, based on ocean model predictions, to gather in situ measurements of interesting and evolving ocean features and phenomena.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Introduces a method to early childhood professionals of observing children as they are involved in everyday play episodes, record children's development and plan for this, while utilising the knowledge and input of the key players in the partnership, parents and teachers.
Resumo:
From September 2000 to June 2003, a community-based program for dengue control using local predacious copepods of the genus Mesocyclops was conducted in three rural communes in the central Vietnam provinces of Quang Nam, Quang Ngai, and Khanh Hoa. Post-project, three subsequent entomologic surveys were conducted until March 2004. The number of households and residents in the communes were 5,913 and 27,167, respectively, and dengue notification rates for these communes from 1996 were as high as 2,418.5 per 100,000 persons. Following knowledge, attitude, and practice evaluations, surveys of water storage containers indicated that Mesocyclops spp. already occurred in 3-17% and that large tanks up to 2,000 liters, 130-300-liter jars, wells, and some 220-liter metal drums were the most productive habitats for Aedes aegypti. With technical support, the programs were driven by communal management committees, health collaborators, schoolteachers, and pupils. From quantitative estimates of the standing crop of third and fourth instars from 100 households, Ae. aegypti were reduced by approximately 90% by year 1, 92.3-98.6% by year 2, and Ae. aegypti immature forms had been eliminated from two of three communes by June 2003. Similarly, from resting adult collections from 100 households, densities were reduced to 0-1 per commune. By March 2004, two communes with no larvae had small numbers but the third was negative; one adult was collected in each of two communes while one became negative. Absolute estimates of third and fourth instars at the three intervention communes and one left untreated had significant correlations (P = 0.009-< 0.001) with numbers of adults aspirated from inside houses on each of 15 survey periods. By year 1, the incidence of dengue disease in the treated communes was reduced by 76.7% compared with non-intervention communes within the same districts, and no dengue was evident in 2002 and 2003, compared with 112.8 and 14.4 cases per 100,000 at district level. Since we had similar success in northern Vietnam from 1998 to 2000, this study demonstrates that this control model is broadly acceptable and achievable at community level but vigilance is required post-project to prevent reinfestation.
Resumo:
Software transactional memory has the potential to greatly simplify development of concurrent software, by supporting safe composition of concurrent shared-state abstractions. However, STM semantics are defined in terms of low-level reads and writes on individual memory locations, so implementations are unable to take advantage of the properties of user-defined abstractions. Consequently, the performance of transactions over some structures can be disappointing. ----- ----- We present Modular Transactional Memory, our framework which allows programmers to extend STM with concurrency control algorithms tailored to the data structures they use in concurrent programs. We describe our implementation in Concurrent Haskell, and two example structures: a finite map which allows concurrent transactions to operate on disjoint sets of keys, and a non-deterministic channel which supports concurrent sources and sinks. ----- ----- Our approach is based on previous work by others on boosted and open-nested transactions, with one significant development: transactions are given types which denote the concurrency control algorithms they employ. Typed transactions offer a higher level of assurance for programmers reusing transactional code, and allow more flexible abstract concurrency control.
Resumo:
We investigated the effect of dielectric filling in a V groove on the propagation parameters of channel plasmon-polariton (CPP) modes. In particular, existence conditions and critical groove angles, mode localization, field structure, dispersion, and propagation distances of CPP modes are analyzed as functions of dielectric permittivity inside the groove. It is demonstrated that increasing dielectric permittivity in the groove results in a rapid increase of mode localization near the tip of the groove and increase of both the critical angles that determine a range of groove angles for which CPP modes can exist. Detailed analysis of the field structure has demonstrated that the maximum of the field in a CPP mode is typically reached at a small distance from the tip of the groove. The effect of rounded tip is also investigated.
Resumo:
Bridges are valuable assets of every nation. They deteriorate with age and often are subjected to additional loads or different load patterns than originally designed for. These changes in loads can cause localized distress and may result in bridge failure if not corrected in time. Early detection of damage and appropriate retrofitting will aid in preventing bridge failures. Large amounts of money are spent in bridge maintenance all around the world. A need exists for a reliable technology capable of monitoring the structural health of bridges, thereby ensuring they operate safely and efficiently during the whole intended lives. Monitoring of bridges has been traditionally done by means of visual inspection. Visual inspection alone is not capable of locating and identifying all signs of damage, hence a variety of structural health monitoring (SHM) techniques is used regularly nowadays to monitor performance and to assess condition of bridges for early damage detection. Acoustic emission (AE) is one technique that is finding an increasing use in SHM applications of bridges all around the world. The chapter starts with a brief introduction to structural health monitoring and techniques commonly used for monitoring purposes. Acoustic emission technique, wave nature of AE phenomenon, previous applications and limitations and challenges in the use as a SHM technique are also discussed. Scope of the project and work carried out will be explained, followed by some recommendations of work planned in future.
Resumo:
One of the main challenges of slow speed machinery condition monitoring is that the energy generated from an incipient defect is too weak to be detected by traditional vibration measurements due to its low impact energy. Acoustic emission (AE) measurement is an alternative for this as it has the ability to detect crack initiations or rubbing between moving surfaces. However, AE measurement requires high sampling frequency and consequently huge amount of data are obtained to be processed. It also requires expensive hardware to capture those data, storage and involves signal processing techniques to retrieve valuable information on the state of the machine. AE signal has been utilised for early detection of defects in bearings and gears. This paper presents an online condition monitoring (CM) system for slow speed machinery, which attempts to overcome those challenges. The system incorporates relevant signal processing techniques for slow speed CM which include noise removal techniques to enhance the signal-to-noise and peak-holding down sampling to reduce the burden of massive data handling. The analysis software works under Labview environment, which enables online remote control of data acquisition, real-time analysis, offline analysis and diagnostic trending. The system has been fully implemented on a site machine and contributing significantly to improve the maintenance efficiency and provide a safer and reliable operation.
Resumo:
Air quality and temperatures in classrooms are important factors influencing the student learning process. To improve the thermal comfort of classrooms for Queensland State Schools, Queensland Government initiated the "Cooler Schools Program". One of the key objectives under this program was to develop low energy cooling systems as an alternative to high energy demand conventioanl split system of air conditioning (AC) systems. In order to compare and evaluate the energy performance of different types of air conditioners installed in classrooms, monitoring systems were installed in a state primary school located in the greater outer urban area of Brisbane, Australia. It was found that the installation of monitoring systems could have a significant impact on the accuracy of the data being collected. By comparing the estimated energy efficiency ratio (EER)for four qualified air conditioners included in this study, it was also found that AC6, a hybrid air conditioner newly developed by the Queensland Department of Public Works (DPW), had the best energy performance, although the current data were not able to show the full advantages of the system.
Resumo:
Increasingly, Australian universities are facing the challenges of global education. While overseas students studying in Australia provide the primary source of export earnings for educational institutions, a number of institutions, including QUT, are also involved in international trade in educational services by providing services offshore. This paper discusses driving forces behind moves by Australian universities to enter the international education market. It then briefly describes Queensland University of Technology’s internationalisation strategy. The paper concludes with a case study describing how the School of Construction Management has pioneered the development of offshore courses at QUT. The introduction of the Master of Project Management and Graduate Diploma of Project Management programs in Singapore in November 1993 represented QUT’s first experience in this area. With the experience of 18 months of operation, the School now has the opportunity to reflect on the outcomes of this venture and consider future options.
Resumo:
Background: Traditional causal modeling of health interventions tends to be linear in nature and lacks multidisciplinarity. Consequently, strategies for exercise prescription in health maintenance are typically group based and focused on the role of a common optimal health status template toward which all individuals should aspire. ----- ----- Materials and methods: In this paper, we discuss inherent weaknesses of traditional methods and introduce an approach exercise training based on neurobiological system variability. The significance of neurobiological system variability in differential learning and training was highlighted.----- ----- Results: Our theoretical analysis revealed differential training as a method by which neurobiological system variability could be harnessed to facilitate health benefits of exercise training. It was observed that this approach emphasizes the importance of using individualized programs in rehabilitation and exercise, rather than group-based strategies to exercise prescription.----- ----- Conclusion: Research is needed on potential benefits of differential training as an approach to physical rehabilitation and exercise prescription that could counteract psychological and physical effects of disease and illness in subelite populations. For example, enhancing the complexity and variability of movement patterns in exercise prescription programs might alleviate effects of depression in nonathletic populations and physical effects of repetitive strain injuries experienced by athletes in elite and developing sport programs.
Resumo:
The antecedents of channel power (e.g. El-Ansary and Stern, 1972) and the impact of channel structure ( e.g. Anderson and Narus,1984) on channel dynamics have long been important topics within the channel literature. In addition to the theoretical and methodological contributions, research in these areas has helped channel managers to understand how power is generated and used in coordinating distribution strategies in different contexts. The study presented in this paper builds upon these previous literatures, which are first briefly reviewed below.