816 resultados para Highway facilities for motorized users.
Resumo:
Rockfall is a geological evolution process involving detachment of blocks or boulders from a slope face, then their free falls, bouncing, rolling or sliding, and finally deposition near the toe of the slope. Many facts indicate that the rockfall can cause hazards to peoples, and it can be regarded as a geological hazard. A rockfall event may only involve a boulder or rock, and also several ones. When there are peoples, buildings, or other man-made establishments within the scope of rockfall trajectory, losses will be possibly induced in tenns of human lives or damages to these facilities. Researches into mechanism, kinematics, dynamics, hazard assessment, risk analysis, and mitigation measures of rockfalls are extremely necessary and important. Occurrence of rockfall is controlled by a lot of conditions, mainly including topographical, geomorphic, geological ones and triggering factors. The rockfall especially in mountainous areas, has different origins, and occurs to be frequent, unexpected, uncertain, in groups, periodic and sectional. The characterization and classification of the rockfalls not only increase knowledge about rockfall mechanism, but also can instruct mitigation of the hazards. In addition, stability of potential rockfalls have various sensitivity to different triggering factors and changes of geometrical conditions. Through theoretical analyses, laboratory experiments and field tests, the author presents some back-analysis methods for friction coefficients of sliding and rolling, and restitution coefficients. The used input data can be obtained economically and accurately in the field. Through deep studies on hazard assessment methods and analysis of factors influencing rockfall hazard, this paper presents a new assessment methodology consisting of preliminary assessment and detailed one. From the application in a 430 km long stretch of the Highway, which is located between Paksho and Nyingtri in Tibet, the methodology can be applicable for the rockfall hazard assessment in complex and difficult terrains. In addition, risk analyses along the stretch are conducted by computing the probability of encountering rockfalls and life losses resulting from rockfall impacts. Rockfall hazards may be mitigated by avoiding hazardous areas, clearness of dangerous rocks, reinforcement, obstructing the rockfalls, leading the rockfalls, warning and monitoring for rockfalls, etc. Seen from present remedial level of rockfall hazards, different mitigation measures, economical and effective buffering units, monitoring tecliniques and consciousness of environmental protection for rockfall mitigations should be further developed.
Resumo:
XP provides efficient and flexible support for pretty printing in Common Lisp. Its single greatest advantage is that it allows the full benefits of pretty printing to be obtained when printing data structures, as well as when printing program code. XP is efficient, because it is based on a linear time algorithm that uses only a small fixed amount of storage. XP is flexible, because users can control the exact form of the output via a set of special format directives. XP can operate on arbitrary data structures, because facilities are provided for specifying pretty printing methods for any type of object. XP also modifies the way abbreviation based on length, nesting depth, and circularity is supported so that they automatically apply to user-defined functions that perform output ??g., print functions for structures. In addition, a new abbreviation mechanism is introduced that can be used to limit the total numbers of lines printed.
Resumo:
XP provides efficient and flexible support for pretty printing in Common Lisp. Its single greatest advantage is that it allows the full benefits of pretty printing to be obtained when printing data structures, as well as when printing program code. XP is efficient, because it is based on a linear time algorithm that uses a small fixed amount of storage. XP is flexible, because users can control the exact form of the output via a set of special format directives. XP can operate on arbitrary data structures, because facilities are provided for specifying pretty printing methods for any type of object.
Resumo:
This Report contains the proceedings of the Fourth Phantom Users Group Workshop contains 17 papers presented October 9-12, 1999 at MIT Endicott House in Dedham Massachusetts. The workshop included sessions on, Tools for Programmers, Dynamic Environments, Perception and Cognition, Haptic Connections, Collision Detection / Collision Response, Medical and Seismic Applications, and Haptics Going Mainstream. The proceedings include papers that cover a variety of subjects in computer haptics including rendering, contact determination, development libraries, and applications in medicine, path planning, data interaction and training.
Resumo:
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enforcement policies is a difficult and error prone task. This thesis describes the development and evaluation of an off-line firewall policy parser and validation tool. This provides the system administrator with a textual interface and the vendor specific low level languages they trust and are familiar with, but the support of an off-line compiler tool. The tool was created using the Microsoft C#.NET language, and the Microsoft Visual Studio Integrated Development Environment (IDE). This provided an object environment to create a flexible and extensible system, as well as simple Web and Windows prototyping facilities to create GUI front-end applications for testing and evaluation. A CLI was provided with the tool, for more experienced users, but it was also designed to be easily integrated into GUI based applications for non-expert users. The evaluation of the system was performed from a custom built GUI application, which can create test firewall rule sets containing synthetic rules, to supply a variety of experimental conditions, as well as record various performance metrics. The validation tool was created, based around a pragmatic outlook, with regard to the needs of the network administrator. The modularity of the design was important, due to the fast changing nature of the network device languages being processed. An object oriented approach was taken, for maximum changeability and extensibility, and a flexible tool was developed, due to the possible needs of different types users. System administrators desire, low level, CLI-based tools that they can trust, and use easily from scripting languages. Inexperienced users may prefer a more abstract, high level, GUI or Wizard that has an easier to learn process. Built around these ideas, the tool was implemented, and proved to be a usable, and complimentary addition to the many network policy-based systems currently available. The tool has a flexible design and contains comprehensive functionality. As opposed to some of the other tools which perform across multiple vendor languages, but do not implement a deep range of options for any of the languages. It compliments existing systems, such as policy compliance tools, and abstract policy analysis systems. Its validation algorithms were evaluated for both completeness, and performance. The tool was found to correctly process large firewall policies in just a few seconds. A framework for a policy-based management system, with which the tool would integrate, is also proposed. This is based around a vendor independent XML-based repository of device configurations, which could be used to bring together existing policy management and analysis systems.
Resumo:
Ferr?, S. and King, R. D. (2004) BLID: an Application of Logical Information Systems in Bioinformatics. In P. Eklund (editor), 2nd International Conference on Formal Concept Analysis (ICFCA), Feb 2004. LNCS 2961, Springer.
Resumo:
Yeoman, A., Durbin, J. & Urquhart, C. (2004). Evaluating SWICE-R (South West Information for Clinical Effectiveness - Rural). Final report for South West Workforce Development Confederations, (Knowledge Resources Development Unit). Aberystwyth: Department of Information Studies, University of Wales Aberystwyth. Sponsorship: South West WDCs (NHS)
Resumo:
Durbin, J. & Urquhart, C. (2003). Qualitative evaluation of KA24 (Knowledge Access 24). Aberystwyth: Department of Information Studies, University of Wales Aberystwyth. Sponsorship: Knowledge Access 24 (NHS)
Resumo:
Urquhart, C. (editor for JUSTEIS team), Spink, S., Thomas, R., Yeoman, A., Durbin, J., Turner, J., Armstrong, A., Lonsdale, R. & Fenton, R. (2003). JUSTEIS (JISC Usage Surveys: Trends in Electronic Information Services) Strand A: survey of end users of all electronic information services (HE and FE), with Action research report. Final report 2002/2003 Cycle Four. Aberystwyth: Department of Information Studies, University of Wales Aberystwyth with Information Automation Ltd (CIQM). Sponsorship: JISC
Resumo:
Thomas, R., Urquhart, C., Crossan, S. & Hines, B. (2008). MUES (Mid Wales - Users - Ethnic Services) Ethnic services provision 2007-08. Report for Libraries for Life: Delivering the entitlement agenda for library users in Wales 2007-09. Aberystwyth: Department of Information Studies, Aberystwyth University. Related policy guidance published separately Sponsorship: CyMAL
Resumo:
Urquhart, C., Thomas, R., Crossan, S. & Hines, B. (2008). MUES (Mid Wales - Users - Ethnic Services) Ethnic services provision 2007-08. Policy guidance for Libraries for Life: Delivering the entitlement agenda for library users in Wales 2007-09. Aberystwyth: Department of Information Studies, Aberystwyth University. Relates to report of same title - http://hdl.handle.net/2160/609 Sponsorship: CyMAL
Resumo:
North, J., Lavallee, D., An investigation of potential users of career transition services in the United Kingdom, Psychology of Sport and Exercise, Vol. 5, No. 1. (January 2004), pp. 77-84. RAE2008