919 resultados para Dangerous situations
Resumo:
Recent literature has argued that environmental efficiency (EE), which is built on the materials balance (MB) principle, is more suitable than other EE measures in situations where the law of mass conversation regulates production processes. In addition, the MB-based EE method is particularly useful in analysing possible trade-offs between cost and environmental performance. Identifying determinants of MB-based EE can provide useful information to decision makers but there are very few empirical investigations into this issue. This article proposes the use of data envelopment analysis and stochastic frontier analysis techniques to analyse variation in MB-based EE. Specifically, the article develops a stochastic nutrient frontier and nutrient inefficiency model to analyse determinants of MB-based EE. The empirical study applies both techniques to investigate MB-based EE of 96 rice farms in South Korea. The size of land, fertiliser consumption intensity, cost allocative efficiency, and the share of owned land out of total land are found to be correlated with MB-based EE. The results confirm the presence of a trade-off between MB-based EE and cost allocative efficiency and this finding, favouring policy interventions to help farms simultaneously achieve cost efficiency and MP-based EE.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
The SimCalc Vision and Contributions Advances in Mathematics Education 2013, pp 419-436 Modeling as a Means for Making Powerful Ideas Accessible to Children at an Early Age Richard Lesh, Lyn English, Serife Sevis, Chanda Riggs … show all 4 hide » Look Inside » Get Access Abstract In modern societies in the 21st century, significant changes have been occurring in the kinds of “mathematical thinking” that are needed outside of school. Even in the case of primary school children (grades K-2), children not only encounter situations where numbers refer to sets of discrete objects that can be counted. Numbers also are used to describe situations that involve continuous quantities (inches, feet, pounds, etc.), signed quantities, quantities that have both magnitude and direction, locations (coordinates, or ordinal quantities), transformations (actions), accumulating quantities, continually changing quantities, and other kinds of mathematical objects. Furthermore, if we ask, what kind of situations can children use numbers to describe? rather than restricting attention to situations where children should be able to calculate correctly, then this study shows that average ability children in grades K-2 are (and need to be) able to productively mathematize situations that involve far more than simple counts. Similarly, whereas nearly the entire K-16 mathematics curriculum is restricted to situations that can be mathematized using a single input-output rule going in one direction, even the lives of primary school children are filled with situations that involve several interacting actions—and which involve feedback loops, second-order effects, and issues such as maximization, minimization, or stabilizations (which, many years ago, needed to be postponed until students had been introduced to calculus). …This brief paper demonstrates that, if children’s stories are used to introduce simulations of “real life” problem solving situations, then average ability primary school children are quite capable of dealing productively with 60-minute problems that involve (a) many kinds of quantities in addition to “counts,” (b) integrated collections of concepts associated with a variety of textbook topic areas, (c) interactions among several different actors, and (d) issues such as maximization, minimization, and stabilization.
Resumo:
Background: Extra corporeal membrane oxygenation (ECMO) is a complex rescue therapy used to provide cardiac and/or respiratory support for critically ill patients who have failed maximal conventional medical management. ECMO is based on a modified cardiopulmonary bypass (CPB) circuit, and can provide cardiopulmonary support for up-to several months. It can be used in a veno venous configuration for isolated respiratory failure, (VV-ECMO), or in a veno arterial configuration (VA-ECMO) where support is necessary for cardiac +/- respiratory failure. The ECMO circuit consists of five main components: large bore cannulae (access cannulae) for drainage of the venous system, and return cannulae to either the venous (in VV-ECMO) or arterial (in VA ECMO) system. An oxygenator, with a vast surface area of hollow filaments, allows addition of oxygen and removal of carbon dioxide; a centrifugal blood pump allows propulsion of blood through the circuit at upto 10 L/minute; a control module and a thermoregulatory unit, which allows for exact temperature control of the extra corporeal blood. Methods: The first successful use of ECMO for ARDS in adults occurred in 1972, and its use has become more commonplace over the last 30 years, supported by the improvement in design and biocompatibility of the equipment, which has reduced the morbidity associated with this modality. Whilst the use of ECMO in neonatal population has been supported by numerous studies, the evidence upon which ECMO was integrated into adult practice was substantially less robust. Results: Recent data, including the CESAR study (Conventional Ventilatory Support versus Extra corporeal membrane oxygenation for Severe Respiratory failure) has added a degree of evidence to the role of ECMO in such a patient population. The CESAR study analysed 180 patients, and confirmed that ECMO was associated with an improved rate of survival. More recently, ECMO has been utilized in numerous situations within the critical care area, including support in high-risk percutaneous interventions in cardiac catheter lab; the operating room, emergency department, as well in specialized inter-hospital retrieval services. The increased understanding of the risk:benefit profile of ECMO, along with a reduction in morbidity associated with its use will doubtless lead to a substantial rise in the utilisation of this modality. As with all extra-corporeal circuits, ECMO opposes the basic premises of the mammalian inflammation and coagulation cascade where blood comes into foreign circulation, both these cascades are activated. Anti-coagulation is readily dealt with through use of agents such as heparin, but the inflammatory excess, whilst less macroscopically obvious, continues un-abated. Platelet consumption and neutrophil activation occur rapidly, and the clinician is faced with balancing the need of anticoagulation for the circuit, against haemostasis in an acutely bleeding patient. Alterations in pharmacokinetics may result in inadequate levels of disease modifying therapeutics, such as antibiotics, hence paradoxically delaying recovery from conditions such as pneumonia. Key elements of nutrition and the innate immune system maysimilarly be affected. Summary: This presentation will discuss the basic features of ECMO to the nonspecialist, and review the clinical conundrum faced by the team treating these most complex cases.
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
Substantial growth has occurred in the telecommunication sector in Papua New Guinea (PNG) since 2007. Mobile telephony has spread to rural and remote localities, following decades of inadequate telephone services. This paper examines the introduction of mobile telephones into a rural village in PNG, and focuses on information access during emergency situations. It considers three tsunami alerts: one immediately prior to the introduction of mobile phone services in the area, and two which occurred after mobile phone reception became available. The research shows that for people with limited access to information, responses to threats such as tsunamis can be inappropriate and driven by fear and panic. By contrast, when there is reliable, timely information available, measured responses can be adopted. This research demonstrates how the use of newly-introduced communication technologies for handling emergencies may work in practice, benefitting people in poorer, rural communities.
Resumo:
between mid 2010 and early 2011, Queensland road related infrastructures were devastated by flood and cyclone related natural disasters. Responding to these recent events and in preparing for more regular and intense climate-change induced events in future, the Queensland Government is now reviewing how post-disaster road infrastructure recovery projects are planned and delivered. In particular, there is awareness that rebuilding such infrastructure need sustainable strategies across economic, environmental and social dimensions. A comprehensive sustainability assessment framework for pre and post disaster situations can minimize negative impact on our communities, economy and environment. This research is underway to develop a comprehensive sustainability element frame work for post disaster management in road infrastructures in Queensland, Australia. Analyzing the implications of disruption to transport network and associated services is an important part of preparing local and regional responses to the impacts of natural disasters. This research can contribute to strategic planning, management leading to safe, efficient and integrated transport system that supports sustainable economic, social and environmental outcomes in Queensland. Within this context, this paper provides an overview of the qualitative mixed-method research approach involving literature reviews and case studies to explore and evaluate a number of sustainability elements with a view to develop operational strategies for disaster recovery road projects.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
This paper proposes a self-tuning feedforward active noise control (ANC) system with online secondary path modeling. The step-size parameters of the controller and modeling filters have crucial rule on the system performance. In literature, these parameters are adjusted by trial-and-error. In other words, they are manually initialized before system starting, which require performing extensive experiments to ensure the convergence of the system. Hence there is no guarantee that the system could perform well under different situations. In the proposed method, the appropriate values for the step-sizes are obtained automatically. Computer simulation results indicate the effectiveness of the proposed method.
Resumo:
Russell, Benton and Kingsley (2010) recently suggested a new association football test comprising three different tasks for the evaluation of players' passing, dribbling and shooting skills. Their stated intention was to enhance ‘ecological validity’ of current association football skills tests allowing generalisation of results from the new protocols to performance constraints that were ‘representative’ of experiences during competitive game situations. However, in this comment we raise some concerns with their use of the term ‘ecological validity’ to allude to aspects of ‘representative task design’. We propose that in their paper the authors confused understanding of environmental properties, performance achievement and generalisability of the test and its outcomes. Here, we argue that the tests designed by Russell and colleagues did not include critical sources of environmental information, such as the active role of opponents, which players typically use to organise their actions during performance. Static tasks which are not representative of the competitive performance environment may lead to different emerging patterns of movement organisation and performance outcomes, failing to effectively evaluate skills performance in sport.
Resumo:
Evidence currently supports the view that intentional interpersonal coordination (IIC) is a self-organizing phenomenon facilitated by visual perception of co-actors in a coordinative coupling (Schmidt, Richardson, Arsenault, & Galantucci, 2007). The present study examines how apparent IIC is achieved in situations where visual information is limited for co-actors in a rowing boat. In paired rowing boats only one of the actors, [bow seat] gets to see the actions of the other [stroke seat]. Thus IIC appears to be facilitated despite the lack of important visual information for the control of the dyad. Adopting a mimetic approach to expert coordination, the present study qualitatively examined the experiences of expert performers (N=9) and coaches (N=4) with respect to how IIC was achieved in paired rowing boats. Themes were explored using inductive content analysis, which led to layered model of control. Rowers and coaches reported the use of multiple perceptual sources in order to achieve IIC. As expected(Kelso, 1995; Schmidt & O’Brien, 1997; Turvey, 1990), rowers in the bow of a pair boat make use of visual information provided by the partner in front of them [stroke]. However, this perceptual information is subordinate to perception Motor Learning and Control S111 of the relationship between the boat hull and water passing beside it. Stroke seat, in the absence of visual information about his/her partner, achieves coordination by picking up information about the lifting or looming of the boat’s stern along with water passage past the hull. In this case it appears that apparent or desired IIC is supported by the perception of extra-personal variables, in this case boat behavior; as this perceptual information source is used by both actors. To conclude, co-actors in two person rowing boats use multiple sources of perceptual information for apparent IIC that changes according to task constraints. Where visual information is restricted IIC is facilitated via extra-personal perceptual information and apparent IIC switches to intentional extra-personal coordination.
Resumo:
In this chapter, we are going to consider how language and practice interact in the process of supporting the learning of students with diverse abilities. You will learn that it is necessary for teachers to understand that while labels carry an administrative function in schools, when used carelessly they operate to stigmatise and exclude those whom we are working to include. This chapter will introduce the concept of equity and explain how the dilemma of difference emerges when we try to determine who should receive support and how. The chapter will also explain how an appreciation of language can help to inform and transform our pedagogy. An example of inclusion in action is provided to illustrate how inclusive language in practice can promote deep cultural changes that benefit both students and teachers. The process of determining appropriate and effective education of students with additional support requirements is troubled by what some refer to as the ‘dilemma of difference’. This dilemma derives mainly from the nature of language and our need to use certain words, terms and categories in order to share common understandings. Without these, educators cannot hope to arrive on the same page, yet such words can take on a life of their own; influencing thoughts, perspectives and attitudes in ways that far outstrip original intentions. The drive for clarity, however, through definition and diagnostic classification can ultimately obscure because of the cultural meanings that become invested within these terms through their use over time and in different professional contexts. In effect, trying to define “difference” in order to provide the right support to particular students is a process that entrenches normative boundaries that in turn create, accentuate and stigmatise whatever we have decided constitutes difference. Language is thus a powerful and dangerous weapon but, like other weapons, language can both hurt and defend. Understanding the power of language enables educators to use it both wisely and safely to the maximum benefit of their students. This chapter will discuss how teachers can recognise and support their students in ways that avoid stigma and the closure of stereotyping.
Resumo:
This symposium focuses on an innovative Patches program that addresses imperatives with respect to the development of intercultural competence. The term, Patches, in this project refers to writing tasks and intercultural activities wherein each task becomes a ‘patch’ that eventually creates a quilt of learning as experienced by 58 second year BEd students from Malaysia and 14 fourth year domestic (Australian) BEd students. We take intercultural competence to mean students “ability to communicate effectively and appropriately in intercultural situations based on [their] intercultural knowledge, skills and attitudes” (Deardorff, 2006). The papers in this symposium provide detailed information about the design of the program, its impact on students’ perceptions of themselves as students, writers, and emerging professionals, and students’ development of intercultural competence.
Resumo:
Alcohol-related driving is a longstanding, serious problem in China (Li, Xie, Nie, & Zhang, 2012). On 1st May, 2011 a national law was introduced to criminalize drunk driving, and imposed serious penalties including jail for driving with a blood alcohol level of above 80mg/100ml. This pilot study, undertaken a year after introduction of the law, sought traffic police officers’ perceptions of drink driving and the practice of breath alcohol testing (BAT) in a large city in Guangdong Province, southern China. A questionnaire survey and semi-structured interviews were used to gain an in-depth understanding of issues relevant to alcohol-related driving. Fifty-five traffic police officers were recruited for the survey and six traffic police officers with a variety of working experience including roadside alcohol breath testing, traffic crash investigation and police resourcing were interviewed individually. The officers were recruited by the first author with the assistance of the staff from Guangdong Institute of Public Health, Centre for Disease Control and Prevention (CDC). Interview participants reported three primary reasons why people drink and drive: 1) being prepared to take the chance of not being apprehended by police; 2) the strong traditional Chinese drinking culture; and 3) insufficient public awareness about the harmfulness of drink driving. Problems associated with the process of breath alcohol testing (BAT) were described and fit broadly into two categories: resourcing and avoiding detection. It was reported that there were insufficient traffic police officers to conduct routine traffic policing, including alcohol testing. Police BAT equipment was considered sufficient for routine traffic situations but not highway traffic operations. Local media and posters are used by the Public Security Bureau which is responsible for education about safe driving but participants thought that the education campaigns are limited in scope. Participants also described detection avoidance strategies used by drivers including: changing route; ignoring a police instruction to stop; staying inside the vehicle with windows and doors locked to avoid being tested; intentionally not performing breath tests correctly; and arguing with officers. This pilot study provided important insights from traffic police in one Chinese city which suggest there may be potential unintended effects of introducing more severe penalties including a range of strategies reportedly used by drivers to avoid detection. Recommendations for future research include a larger study to confirm these findings and examine the training and education of drivers; the focus and reach of publicity; and possible resource needs to support police enforcement.
Resumo:
Analyzing emotional states under duress or during heightened, life-and-death situations is extremely difficult, especially given the inability of laboratory experiments to replicate the environment and given the inherent biases of post event surveys. This is where natural experiments, such as the pager communications from September 11th can provide the kind of natural experiment emotion researchers have been seeking. We demonstrate that positive and pro-social communications are the first to emerge followed by the slower and lower negative communications. Religious sentiment is the last to emerge, as individual attempt to make sense of event. Additionally we provide a methodological discussion about the preparation and analysis of such natural experiments (the pager message content) and show the importance of using multiple methods to extract the broadest possible understanding.