982 resultados para Classifying Party Systems


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the response of multi-storey structures under simulated earthquake loads with friction dampers, viscoelastic dampers and combined friction-viscoelastic damping devices strategically located within shear walls. Consequently, evaluations are made as to how the damping systems affect the seismic response of these structures with respect to deflections and accelerations. In particular, this paper concentrates on the effects of damper types, configurations and their locations within the cut-outs of shear walls. The initial stiffness of the cut out section of the shear wall is removed and replaced by the stiffness and damping of the device. Influence of parameters of damper properties such as stiffness, damping coefficient, location, configuration and size are studied and evaluated using results obtained under several different earthquake scenarios. Structural models with cut outs at different heights are treated in order to establish the effectiveness of the dampers and their optimal placement. This conceptual study has demonstrated the feasibility of mitigating the seismic response of building structures by using embedded dampers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several approaches have been introduced in the literature for active noise control (ANC) systems. Since the filtered-x least-mean-square (FxLMS) algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of the FxLMS algorithm, as a first novelty. In many ANC applications, an on-line secondary path modeling method using white noise as a training signal is required to ensure convergence of the system. As a second novelty, this paper proposes a new approach for on-line secondary path modeling on the basis of a new variable-step-size (VSS) LMS algorithm in feed forward ANC systems. The proposed algorithm is designed so that the noise injection is stopped at the optimum point when the modeling accuracy is sufficient. In this approach, a sudden change in the secondary path during operation makes the algorithm reactivate injection of the white noise to re-adjust the secondary path estimate. Comparative simulation results shown in this paper indicate the effectiveness of the proposed approach in reducing both narrow-band and broad-band noise. In addition, the proposed ANC system is robust against sudden changes of the secondary path model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In practical cases for active noise control (ANC), the secondary path has usually a time varying behavior. For these cases, an online secondary path modeling method that uses a white noise as a training signal is required to ensure convergence of the system. The modeling accuracy and the convergence rate are increased when a white noise with a larger variance is used. However, the larger variance increases the residual noise, which decreases performance of the system and additionally causes instability problem to feedback structures. A sudden change in the secondary path leads to divergence of the online secondary path modeling filter. To overcome these problems, this paper proposes a new approach for online secondary path modeling in feedback ANC systems. The proposed algorithm uses the advantages of white noise with larger variance to model the secondary path, but the injection is stopped at the optimum point to increase performance of the algorithm and to prevent the instability effect of the white noise. In this approach, instead of continuous injection of the white noise, a sudden change in secondary path during the operation makes the algorithm to reactivate injection of the white noise to correct the secondary path estimation. In addition, the proposed method models the secondary path without the need of using off-line estimation of the secondary path. Considering the above features increases the convergence rate and modeling accuracy, which results in a high system performance. Computer simulation results shown in this paper indicate effectiveness of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Legal Services Commissioner and Wright [2010] QSC 168 and Amos v Ian K Fry & Company, the Supreme Court of Queensland considered the scope of some of the provisions of the Legal Profession Act 2007 (Qld), including the definition of “third party payer” in s 301 of the Act.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decision in the New South Wales Supreme Court in Boyce v McIntyre [2008] NSWSC 1218 involved determination of a number of issues relating to an assessment of costs under the Legal Profession Act 2004 (NSW). The issue of broad significance was whether a non-associated third party payer must pay the fixed fee that was agreed between the law practice and the client. The court found that the client agreement did not form the basis of assessing costs for the non-associated third party payer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Deppro Pty Ltd v Hannah [2008] QSC 193 one of the matters considered by the court related to the requirement in r 243 of the Uniform Civil Procedure Rules 1999 (Qld) that a notice of non-party disclosure must “state the allegation in issue in the pleadings about which the document sought is directly relevant.”The approach adopted by the issuing party in this case of asserting that documents sought by a notice of non-party disclosure are relevant to allegations in numbered paragraphs in pleadings, and serving copies of the pleadings with the notice, is not uncommon in practice. This decision makes it clear that this practice is fraught with danger. In circumstances where it is not apparent that the non-party has been fully apprised of the relevant issues the decision suggests an applicant for non-party disclosure who has not complied with the requirements of s 243 might be required to issue a fresh, fully compliant notice, and to suffer associated costs consequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an adaptive metering algorithm for enhancing the electronic screening (e-screening) operation at truck weight stations. This algorithm uses a feedback control mechanism to control the level of truck vehicles entering the weight station. The basic operation of the algorithm allows more trucks to be inspected when the weight station is underutilized by adjusting the weight threshold lower. Alternatively, the algorithm restricts the number of trucks to inspect when the station is overutilized to prevent queue spillover. The proposed control concept is demonstrated and evaluated in a simulation environment. The simulation results demonstrate the considerable benefits of the proposed algorithm in improving overweight enforcement with minimal negative impacts on nonoverweighed trucks. The test results also reveal that the effectiveness of the algorithm improves with higher truck participation rates in the e-screening program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives To review the existing research on the effectiveness of heat warning systems (HWSs) in saving lives and reducing harm. Methods A systematic search of major databases was conducted, using “heat, heatwave, high temperature, hot temperature, OR hot climate” AND “warning system”. Results Fifteen articles were retrieved. Six studies asserted that fewer people died of excessive heat after HWS implementation. HWS was associated with reduction in ambulance use. One study estimated the benefits of HWS to be 468millionforsaving117livescomparedto210,000 costs of running the system. Eight studies showed that mere availability of HWS did not lead to behavioral changes. Perceived threat of heat dangers to self/others was the main factor related to heeding warnings and taking proper actions. However, costs and barriers associated with taking protective actions, such as costs of running air conditioners, were of significant concern particularly to the poor. Conclusions Research in this area is limited. Prospective designs applying health behavior theories should establish whether HWS can produce the health benefits they are purported to achieve by identifying the target vulnerable groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heatwaves are associated with significant health risks particularly among vulnerable groups. To minimize these risks, heat warning systems have been implemented. The question therefore is how effective these systems are in saving lives and reducing heat-related harm. We systematically searched and reviewed 15 studies which examined this. Six studies asserted that fewer people died of excessive heat after the implementation of heat warning systems. Demand for ambulance decreased following the implementation of these systems. One study also estimated the costs of running heat warning systems at US$210,000 compared to the US$468 million benefits of saving 117 lives. The remaining eight studies investigated people?s response to heat warning systems and taking appropriate actions against heat harms. Perceived threat of heat dangers emerged as the main factor related to heeding the warnings and taking proper actions. However, barriers, such as costs of running air-conditioners, were of significant concern, particularly to the poor. The weight of the evidence suggests that heat warning systems are effective in reducing mortality and, potentially, morbidity. However, their effectiveness may be mediated by cognitive, emotive and socio-demographic characteristics. More research is urgently required into the cost-effectiveness of heat warning systems? measures and improving the utilization of the services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service research in information systems (IS) has received attention over many years (e.g. Kettinger and Lee, 1994), but more recently has increased substantially in both diversity and volume (Rai and Sambamurthy, 2006). A service-oriented view of information technology (IT) is gradually taking hold in both academia and industry. This is concomitant with the growth of service-related phenomena and concepts (Lusch and Vargo, 2006), stimulating a global discourse about 'service science' as a new, cross-disciplinary field of research (Chesbrough and Spohrer, 2006).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fire safety design is important to eliminate the loss of property and lives during fire events. Gypsum plasterboard is widely used as a fire safety material in the building industry all over the world. It contains gypsum (CaSO4.2H2O) and Calcium Carbonate (CaCO3) and most importantly free and chemically bound water in its crystal structure. The dehydration of the gypsum and the decomposition of Calcium Carbonate absorb heat, which gives the gypsum plasterboard fire resistant qualities. Currently plasterboard manufacturers use additives such as vermiculite to overcome shrinkage of gypsum core and glass fibre to bridge shrinkage cracks and enhance the integrity of board during calcination and after the loss of paper facings in fires. Past research has also attempted to reduce the thermal conductivity of plasterboards using fillers. However, no research has been undertaken to enhance the specific heat of plasterboard and the points of dehydration using chemical additives and fillers. Hence detailed experimental studies of powdered samples of plasterboard mixed with chemical additives and fillers in varying proportions were conducted. These tests showed the enhancement of specific heat of plasterboard. Numerical models were also developed to investigate the thermal performance of enhanced plasterboards under standard fire conditions. The results showed that the use of these enhanced plasterboards in steel wall systems can significantly improve their fire performance. This paper presents the details of this research and the results that can be used to enhance the fire safety of steel wall systems commonly used in buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural framing systems and mechanisms designed for normal use rarely possess adequate robustness to withstand the effects of large impacts, blasts and extreme earthquakes that have been experienced in recent times. Robustness is the property of systems that enables them to survive unforeseen or unusual circumstances (Knoll & Vogel, 2009). Queensland University of Technology with industry collaboration is engaged in a program of research that commenced 15 years ago to study the impact of such unforeseeable phenomena and investigate methods of improving robustness and safety with protective mechanisms embedded or designed in structural systems. This paper highlights some of the research pertaining to seismic protection of building structures, rollover protective structures and effects of vehicular impact and blast on key elements in structures that could propagate catastrophic and disproportionate collapse.