977 resultados para Emergency Shelter Grant Program (U.S.)
Resumo:
The cost and risk associated with mineral exploration in Australia increases significantly as companies move into deeper regolith-covered terrain. The ability to map the bedrock and the depth of weathering within an area has the potential to decrease this risk and increase the effectiveness of exploration programs. This paper is the second in a trilogy concerning the Grant's Patch area of the Eastern Goldfields. The recent development of the VPmg potential field inversion program in conjunction with the acquisition of high-resolution gravity data over an area with extensive drilling provided an opportunity to evaluate three-dimensional gravity inversion as a bedrock and regolith mapping tool. An apparent density model of the study area was constructed, with the ground represented as adjoining 200 m by 200 m vertical rectangular prisms. During inversion VPmg incrementally adjusted the density of each prism until the free-air gravity response of the model replicated the observed data. For the Grant's Patch study area, this image of the apparent density values proved easier to interpret than the Bouguer gravity image. A regolith layer was introduced into the model and realistic fresh-rock densities assigned to each basement prism according to its interpreted lithology. With the basement and regolith densities fixed, the VPmg inversion algorithm adjusted the depth to fresh basement until the misfit between the calculated and observed gravity response was minimised. The resulting geometry of the bedrock/regolith contact largely replicated the base of weathering indicated by drilling with predicted depth of weathering values from gravity inversion typically within 15% of those logged during RAB and RC drilling.
Resumo:
Ethnographic data collected over a 5-year period is analyzed to determine how the Personal Responsibility & Work Opportunity Reconciliation Act of 1996 (PRWORA) has affected the lives of young male drug dealers from AIDS-afflicted families residing in Detroit. The data analysis indicated that the participants perceived drug dealing as the only viable employment opportunity for meeting the quotidian & health care needs of their families. The findings also revealed that the participants were highly aware of local political processes & the necessities of caring for relatives living with AIDS. Additional attention is dedicated to exploring the state of MI's rationale for ending the General Assistance Program, the sociocultural foundations of the PRWORA, various stipulations of the PRWORA, & how the PRWORA has augmented the legal vulnerability of welfare recipients. It is concluded that the PRWORA will force many welfare recipients to engage in illicit activities & will generally decrease recipients' health. 59 References. J. W. Parker
Resumo:
The influence of the dispersion of vapor grown carbon nanofibers (VGCNF) on the electrical properties of VGCNF/epoxy composites has been studied. A homogeneous dispersion of the VGCNF does not imply better electrical properties. The presence of well distributed clusters appears to be a key factor for increasing composite conductivity. It is also shown that the main conduction mechanism has an ionic nature for concentrations below the percolation threshold, while above the percolation threshold it is dominated by hopping between the fillers. Finally, using the granular system theory it is possible to explain the origin of conduction at low temperatures.
Resumo:
The influence of the dispersion of vapor-grown carbon nanofibers (VGCNF) on the electrical properties of VGCNF/ Epoxy composites has been studied. A homogenous dispersion of the VGCNF does not imply better electrical properties. In fact, it is demonstrated that the most simple of the tested dispersion methods results in higher conductivity, since the presence of well-distributed nanofiber clusters appears to be a key factor for increasing composite conductivity.
Resumo:
When China launched an anti-satellite (ASAT) weapon in January 2007 to destroy one of its inactive weather satellites, most reactions from academics and U.S. space experts focused on a potential military “space race” between the United States and China. Overlooked, however, is China’s growing role as global competitor on the non-military side of space. China’s space program goes far beyond military counterspace applications and manifests manned space aspirations, including lunar exploration. Its pursuit of both commercial and scientific international space ventures constitutes a small, yet growing, percentage of the global space launch and related satellite service industry. It also highlights China’s willingness to cooperate with nations far away from Asia for political and strategic purposes. These partnerships may constitute a challenge to the United States and enhance China’s “soft power” among key American allies and even in some regions traditionally dominated by U.S. influence (e.g., Latin America and Africa). Thus, an appropriate U.S. response may not lie in a “hard power” counterspace effort but instead in a revival of U.S. space outreach of the past, as well as implementation of more business-friendly export control policies.
Resumo:
The aim of the present study was to investigate the detection percentage of tuberculosis among patients that are respiratory symptomatic (TB suspects). In this work, we present the preliminary results of research carried out at "Hospital das Clínicas de Teresópolis Costantino Ottaviano da Fundação Educacional Serra dos Órgãos (FESO)" from November 2003 to April 2004. Among the 40 respiratory symptomatic individuals identified and referred to the Tuberculosis Control Program in Teresópolis, two (5.0%) were characterized as smear-positive. These results confirm reports in the literature and underscore the need for and importance of this strategy.
Resumo:
Mutable state can be useful in certain algorithms, to structure programs, or for efficiency purposes. However, when shared mutable state is used in non-local or nonobvious ways, the interactions that can occur via aliases to that shared memory can be a source of program errors. Undisciplined uses of shared state may unsafely interfere with local reasoning as other aliases may interleave their changes to the shared state in unexpected ways. We propose a novel technique, rely-guarantee protocols, that structures the interactions between aliases and ensures that only safe interference is possible. We present a linear type system outfitted with our novel sharing mechanism that enables controlled interference over shared mutable resources. Each alias is assigned separate, local roles encoded in a protocol abstraction that constrains how an alias can legally use that shared state. By following the spirit of rely-guarantee reasoning, our rely-guarantee protocols ensure that only safe interference can occur but still allow many interesting uses of shared state, such as going beyond invariant and monotonic usages. This thesis describes the three core mechanisms that enable our type-based technique to work: 1) we show how a protocol models an alias’s perspective on how the shared state evolves and constrains that alias’s interactions with the shared state; 2) we show how protocols can be used while enforcing the agreed interference contract; and finally, 3) we show how to check that all local protocols to some shared state can be safely composed to ensure globally safe interference over that shared memory. The interference caused by shared state is rooted at how the uses of di↵erent aliases to that state may be interleaved (perhaps even in non-deterministic ways) at run-time. Therefore, our technique is mostly agnostic as to whether this interference was the result of alias interleaving caused by sequential or concurrent semantics. We show implementations of our technique in both settings, and highlight their di↵erences. Because sharing is “first-class” (and not tied to a module), we show a polymorphic procedure that enables abstract compositions of protocols. Thus, protocols can be specialized or extended without requiring specific knowledge of the interference produce by other protocols to that state. We show that protocol composition can ensure safety even when considering abstracted protocols. We show that this core composition mechanism is sound, decidable (without the need for manual intervention), and provide an algorithm implementation.
Resumo:
A series of colloidal MxFe3-xO4 (M = Mn, Co, Ni; x = 0–1) nanoparticles with diameters ranging from 6.8 to 11.6 nm was synthesized by hydrothermal reaction in aqueous medium at low temperature (200 °C). Energy-dispersive X-ray microa-nalysis and inductively coupled plasma spectrometry confirms that the actual elemental compositions agree well with the nominal ones. The structural properties of obtained nanoparticles were investigated by using powder X-ray diffraction, Raman scattering, Mössbauer spectroscopy, and electron microscopy. The results demonstrate that our synthesis technique leads to the formation of chemically uniform single-phase solid solution nanoparticles with cubic spinel structure, confirming the intrinsic doping. Magnetic studies showed that, in comparison to Fe3O4, the saturation magnetization of MxFe3-xO4 (M = Mn, Ni) decreases with increasing dopant concentration, while Co-doped samples showed similar saturation magnetizations. On other hand, whereas Mn- and Ni-doped nanoparticles exhibits superparamagnetic behavior at room temperature, ferromagnetism emerges for CoxFe3-xO4 nanoparticles, which can be tuned by the level of Co doping.
Resumo:
In the trend towards tolerating hardware unreliability, accuracy is exchanged for cost savings. Running on less reliable machines, functionally correct code becomes risky and one needs to know how risk propagates so as to mitigate it. Risk estimation, however, seems to live outside the average programmer’s technical competence and core practice. In this paper we propose that program design by source-to-source transformation be risk-aware in the sense of making probabilistic faults visible and supporting equational reasoning on the probabilistic behaviour of programs caused by faults. This reasoning is carried out in a linear algebra extension to the standard, `a la Bird-Moor algebra of programming. This paper studies, in particular, the propagation of faults across standard program transformation techniques known as tupling and fusion, enabling the fault of the whole to be expressed in terms of the faults of its parts.
Resumo:
Abstract Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE-speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the ReFlO tool and present two non-trivial case studies as evidence of our work’s generality
Resumo:
Scientific Framework