934 resultados para Head-on Collisions.
Resumo:
Computer experiments of interstellar cloud collisions were performed with a new smoothed-particle-hydrodynamics (SPH) code. The SPH quantities were calculated by using spatially adaptive smoothing lengths and the SPH fluid equations of motion were solved by means of a hierarchical multiple time-scale leapfrog. Such a combination of methods allows the code to deal with a large range of hydrodynamic quantities. A careful treatment of gas cooling by H, H(2), CO and H II, as well as a heating mechanism by cosmic rays and by H(2) production on grains surface, were also included in the code. The gas model reproduces approximately the typical environment of dark molecular clouds. The experiments were performed by impinging two dynamically identical spherical clouds onto each other with a relative velocity of 10 km s(-1) but with a different impact parameter for each case. Each object has an initial density profile obeying an r(-1)-law with a cutoff radius of 10 pc and with an initial temperature of 20 K. As a main result, cloud-cloud collision triggers fragmentation but in expense of a large amount of energy dissipated, which occurred in the head-on case only. Off-center collision did not allow remnants to fragment along the considered time (similar to 6 Myr). However, it dissipated a considerable amount of orbital energy. Structures as small as 0.1 pc, with densities of similar to 10(4) cm(-3), were observed in the more energetic collision.
Resumo:
In this Letter we analyze the energy distribution evolution of test particles injected in three dimensional (3D) magnetohydrodynamic (MHD) simulations of different magnetic reconnection configurations. When considering a single Sweet-Parker topology, the particles accelerate predominantly through a first-order Fermi process, as predicted in [3] and demonstrated numerically in [8]. When turbulence is included within the current sheet, the acceleration rate is highly enhanced, because reconnection becomes fast and independent of resistivity [4,11] and allows the formation of a thick volume filled with multiple simultaneously reconnecting magnetic fluxes. Charged particles trapped within this volume suffer several head-on scatterings with the contracting magnetic fluctuations, which significantly increase the acceleration rate and results in a first-order Fermi process. For comparison, we also tested acceleration in MHD turbulence, where particles suffer collisions with approaching and receding magnetic irregularities, resulting in a reduced acceleration rate. We argue that the dominant acceleration mechanism approaches a second order Fermi process in this case.
Resumo:
Aufbau einer kontinuierlichen, mehrdimensionalen Hochleistungs-flüssigchromatographie-Anlage für die Trennung von Proteinen und Peptiden mit integrierter größenselektiver ProbenfraktionierungEs wurde eine mehrdimensionale HPLC-Trennmethode für Proteine und Peptide mit einem Molekulargewicht von <15 kDa entwickelt.Im ersten Schritt werden die Zielanalyte von höhermolekularen sowie nicht ionischen Bestandteilen mit Hilfe von 'Restricted Access Materialien' (RAM) mit Ionenaustauscher-Funktionalität getrennt. Anschließend werden die Proteine auf einer analytischen Ionenaustauscher-Säule sowie auf Reversed-Phase-Säulen getrennt. Zur Vermeidung von Probenverlusten wurde ein kontinuierlich arbeitendes, voll automatisiertes System auf Basis unterschiedlicher Trenngeschwindigkeiten und vier parallelen RP-Säulen aufgebaut.Es werden jeweils zwei RP-Säulen gleichzeitig, jedoch mit zeitlich versetztem Beginn eluiert, um durch flache Gradienten ausreichende Trennleistungen zu erhalten. Während die dritte Säule regeneriert wird, erfolgt das Beladen der vierte Säule durch Anreicherung der Proteine und Peptide am Säulenkopf. Während der Gesamtanalysenzeit von 96 Minuten werden in Intervallen von 4 Minuten Fraktionen aus der 1. Dimension auf die RP-Säulen überführt und innerhalb von 8 Minuten getrennt, wobei 24 RP-Chromatogramme resultieren.Als Testsubstanzen wurden u.a. Standardproteine, Proteine und Peptide aus humanem Hämofiltrat sowie aus Lungenfibroblast-Zellkulturüberständen eingesetzt. Weiterhin wurden Fraktionen gesammelt und mittels MALDI-TOF Massenspektrometrie untersucht. Bei einer Injektion wurden in den 24 RP-Chromatogrammen mehr als 1000 Peaks aufgelöst. Der theoretische Wert der Peakkapazität liegt bei ungefähr 3000.
Resumo:
Children are less stable than adults during static upright stance. We investigated whether the same holds true for a task that was novel for both children and adults and highly dynamic: single-legged stance on a slackline. We compared 8-year-olds with young adults and assessed the following outcome measures: time on the slackline, stability on the slack-line (calculated from slackline reaction force), gaze movement, head-in-space rotation and translation, trunk-in-space rotation, and head-on-trunk rotation. Eight-year-olds fell off the slackline quicker and were generally less stable on the slackline than adults. Eight-year-olds also showed more head-in-space rotation and translation, and more gaze variability around a visual anchor point they were instructed to fixate. Trunk-in-space and head-on-trunk rotations did not differ between groups. The results imply that the lower postural stability of 8-year-olds compared to adults – as found in simple upright stance – holds true for dynamic, novel tasks in which adults lack the advantage of more practice. They also suggest that the lack of head and gaze stability constitutes an important limiting factor in children’s ability to master such tasks
Resumo:
We analyze the causal structure of the two-dimensional (2D) reduced background used in the perturbative treatment of a head-on collision of two D-dimensional Aichelburg–Sexl gravitational shock waves. After defining all causal boundaries, namely the future light-cone of the collision and the past light-cone of a future observer, we obtain characteristic coordinates using two independent methods. The first is a geometrical construction of the null rays which define the various light cones, using a parametric representation. The second is a transformation of the 2D reduced wave operator for the problem into a hyperbolic form. The characteristic coordinates are then compactified allowing us to represent all causal light rays in a conformal Carter–Penrose diagram. Our construction holds to all orders in perturbation theory. In particular, we can easily identify the singularities of the source functions and of the Green’s functions appearing in the perturbative expansion, at each order, which is crucial for a successful numerical evaluation of any higher order corrections using this method.
Resumo:
Safety at roadway intersections is of significant interest to transportation professionals due to the large number of intersections in transportation networks, the complexity of traffic movements at these locations that leads to large numbers of conflicts, and the wide variety of geometric and operational features that define them. A variety of collision types including head-on, sideswipe, rear-end, and angle crashes occur at intersections. While intersection crash totals may not reveal a site deficiency, over exposure of a specific crash type may reveal otherwise undetected deficiencies. Thus, there is a need to be able to model the expected frequency of crashes by collision type at intersections to enable the detection of problems and the implementation of effective design strategies and countermeasures. Statistically, it is important to consider modeling collision type frequencies simultaneously to account for the possibility of common unobserved factors affecting crash frequencies across crash types. In this paper, a simultaneous equations model of crash frequencies by collision type is developed and presented using crash data for rural intersections in Georgia. The model estimation results support the notion of the presence of significant common unobserved factors across crash types, although the impact of these factors on parameter estimates is found to be rather modest.
Resumo:
The Rudd Labour Government rode to power in Australia on the education promise of 'an education revolution'. The term 'education revolution' carries all the obligatory marketing metaphors that an aspirant government might want recognised by the general public on the eve government came to power however in revolutionary terms it fades into insignificance in comparison to the real revolution in Australian education. This revolution simply put is to elevate Indigenous Knowledge Systems, in Australian Universities. In the forty three years since the nation setting Referendum of 1967 a generation has made a beach head on the educational landscape. Now a further generation who having made it into the field of higher degrees yearn for the ways and means to authentically marshal Indigenous knowledge? The Institute of Koorie Education at Deakin has for over twenty years not only witnessed the transition but is also a leader in the field. With the appointment of two Chairs of Indigenous Knowledge Systems to build on to its already established research profile the Institute moved towards what is the 'real revolution' in education – the elevation of Indigenous Knowledge as a legitimate knowledge system. This paper lays out the Institute of Koorie Education‘s Research Plan and the basis of an argument put to the academy that will be the driver for this pursuit.
Resumo:
The journalism revolution is upon us. In a world where we are constantly being told that everyone can be a publisher and challenges are emerging from bloggers, Twitterers and podcasters, journalism educators are inevitably reassessing what skills we now need to teach to keep our graduates ahead of the game. QUT this year tackled that question head-on as a curriculum review and program restructure resulted in a greater emphasis on online journalism. The author spent a week in the online newsrooms of each of two of the major players – ABC online news and thecouriermail.com to watch, listen and interview some of the key players. This, in addition to interviews with industry leaders from Fairfax and news.com, lead to the conclusion that while there are some new skills involved in new media much of what the industry is demanding is in fact good old fashioned journalism. Themes of good spelling, grammar, accuracy and writing skills and a nose for news recurred when industry players were asked what it was that they would like to see in new graduates. While speed was cited as one of the big attributes needed in online journalism, the conclusion of many of the players was that the skills of a good down-table sub or a journalist working for wire service were not unlike those most used in online newsrooms.
Resumo:
This paper presents a preliminary flight test based detection range versus false alarm performance characterisation of a morphological-hidden Markov model filtering approach to vision-based airborne dim-target collision detection. On the basis of compelling in-flight collision scenario data, we calculate system operating characteristic (SOC) curves that concisely illustrate the detection range versus false alarm rate performance design trade-offs. These preliminary SOC curves provide a more complete dim-target detection performance description than previous studies (due to the experimental difficulties involved, previous studies have been limited to very short flight data sample sets and hence have not been able to quantify false alarm behaviour). The preliminary investigation here is based on data collected from 4 controlled collision encounters and supporting non-target flight data. This study suggests head-on detection ranges of approximately 2.22 km under blue sky background conditions (1.26 km in cluttered background conditions), whilst experiencing false alarms at a rate less than 1.7 false alarms/hour (ie. less than once every 36 minutes). Further data collection is currently in progress.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
Automated airborne collision-detection systems are a key enabling technology for facilitat- ing the integration of unmanned aerial vehicles (UAVs) into the national airspace. These safety-critical systems must be sensitive enough to provide timely warnings of genuine air- borne collision threats, but not so sensitive as to cause excessive false-alarms. Hence, an accurate characterisation of detection and false alarm sensitivity is essential for understand- ing performance trade-offs, and system designers can exploit this characterisation to help achieve a desired balance in system performance. In this paper we experimentally evaluate a sky-region, image based, aircraft collision detection system that is based on morphologi- cal and temporal processing techniques. (Note that the examined detection approaches are not suitable for the detection of potential collision threats against a ground clutter back- ground). A novel collection methodology for collecting realistic airborne collision-course target footage in both head-on and tail-chase engagement geometries is described. Under (hazy) blue sky conditions, our proposed system achieved detection ranges greater than 1540m in 3 flight test cases with no false alarm events in 14.14 hours of non-target data (under cloudy conditions, the system achieved detection ranges greater than 1170m in 4 flight test cases with no false alarm events in 6.63 hours of non-target data). Importantly, this paper is the first documented presentation of detection range versus false alarm curves generated from airborne target and non-target image data.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.
Resumo:
This body of photographic work has been created to firstly, explore a new approach to practice-led research that uses an “action genre” approach to reflective practice (Lemke) and secondly, to visually explore human interaction with the fundamental item in life - water. The first of these is based on the contention that to understand the meanings inherent in photographs we cannot look merely at the end result. It is essential to keep looking at the actions of practitioners, and the influences upon them, to determine how external influences affect the meaning potential of editorial photographs (Grayson, 2012). WATER therefore, provides an ideal platform to reflect upon the actions and influences involved in creating work within the photographic genre of photojournalism. It enables this practitioner to reflect on each stage of production to gain a better understanding of how external influences impact the narrative potential within images created. There are multi-faceted influences experienced by photographers who are creating images that, in turn, are part of constructing and presenting the narrative potential of editorial photographs. There is an important relationship between professional photographers and the technical, cultural, economic and institutional forces that impinge upon all stages of production and publication. What results is a greater understanding of technical, cultural, economic and institutional forces that impinge upon all stages of production and publication. Therefore, to understand the meanings inherent in photographs within WATER, I do not look merely at the end result. It provides a case study looking at my actions in the filed, and the influences upon me, to determine how external influences affect the meaning potential of these photographs (Grayson, 2012). As a result, this project adds to the body of scholarship around the definition of Photojournalism, how it has adapted to the current media environment and provides scope for further research into emerging new genres within editorial photography, such as citizen photojournalism. Concurrently, the photographs themselves were created to visually explore how there remains a humanistic desire to interact with the natural form of water even while living a modern cosmopolitan life around it. Taking a photojournalistic approach to exploring this phenomenon, the images were created by “capturing moments as they happened” with no posing or setting up of images. This serendipitous approach to the photographic medium provides the practitioner with at least an attempt to direct the subjectivity contained explicitly in photographs. What results is a series of images that extend the visual dialogue around the role of water within modern humanistic lifestyles and how it remains an integral part of our society’s behaviors. It captures important moments that document this relationship at this time of modern development. The resulting works were exhibited and published as part of the Head On Photo Festival, Australia's largest photo festival and the world's second largest festival in Sydney 20-24 May 2013. The WATER series of images were curated by three Magnum members; Ian Berry, Eli Reed and Chris Steele-Perkins. Magnum is a highly regarded international photographic co-operative with editorial offices in New York, London, Paris and Tokyo. There was a projection of the works as part of the official festival programme, presented to both members of the public and Sydney’s photography professionals. In addition, a sample of images from the WATER series was chosen for inclusion in the Magnum-published hardcover book. References Grayson, Louise. 2012. “Editorial photographs and patterns of practice.” Journalism Practice. Accessed: http://www.tandfonline.com/doi/abs/10.1080/17512786.2012.726836#.UbZN-L--1RQ Lemke, Jay. 1995. Textual Politics: Discourse and Social Dynamics. London: Taylor & Francis.
Resumo:
Social media are now widely used for political protests, campaigns, and communication in developed and developing nations, but available research has not yet paid sufficient attention to experiences beyond the US and UK. This collection tackles this imbalance head-on, compiling cutting-edge research across six continents to provide a comprehensive, global, up-to-date review of recent political uses of social media. Drawing together empirical analyses of the use of social media by political movements and in national and regional elections and referenda, The Routledge Companion to Social Media and Politics presents studies ranging from Anonymous and the Arab Spring to the Greek Aganaktismenoi, and from South Korean presidential elections to the Scottish independence referendum. The book is framed by a selection of keystone theoretical contributions, evaluating and updating existing frameworks for the social media age. "Comprehensive and definitive, this is an outstanding book that provides a panoramic view of politics in an era of social media. From the Mediterranean to East Asia to Oceania, from Scandinavia to sub-Sahara Africa to Latin America, the volume as a whole is truly global, yet with nuanced regional and national analyses in each chapter. Theoretically informed, the research presented here breaks new empirical grounds using latest digital methods. The result is a milestone for our collective understanding of new media technology and comparative politics in the twenty-first century." ―Jack Linchuan Qiu, The Chinese University of Hong Kong "This book brings together top scholars from across disciplines and across the globe to examine social media use in a variety of political systems and for distinct purposes. It is required reading for anyone interested in understanding the many ways that digital communication technologies now are used in political life." ―Jennifer Stromer-Galley, Syracuse University