933 resultados para collision avoidance
Resumo:
Many studies have reported increasing levels of obesity and overweight in children. Recent policy developments have examined a range of influences on children's eating habits but have left largely unexamined the role of parents in general and mothers in particular. In this study we examined mothers’ understandings of healthy eating and of their influence on their children's eating patterns. Semi-structured interviews were conducted with nine mothers of children aged between 4 and 12 years of age. Interviewees displayed knowledge of recommended eating practices for their children but distinguished this knowledge from actual eating practices. Avoidance of negative social perceptions, pleasure in eating and opportunities for fast food were regarded as more important than eating in accordance with recommended nutritional guidelines. Moreover, the food choices made were viewed as positive alternatives to eating based on nutritional balance. These views pose a challenge for policy initiatives to address obesity and excess weight in children. Future initiatives should have increased regard for the everyday contexts within which children's eating patterns are understood and justified.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
The deposition of small metal clusters (Cu, Au and Al) on f.c.c. metals (Cu, Au and Ni) has been studied by molecular dynamics simulation using Finnis–Sinclair (FS) potential. The impact energy varied from 0.01 to 10 eV/atom. First, the deposition of single cluster was simulated. We observed that, even at much lower energy, a small cluster with (Ih) icosahedral symmetry was reconstructed to match the substrate structure (f.c.c.) after deposition. Next, clusters were modeled to drop, one after the other, on the surface. The nanostructure was found by soft landing of Au clusters on Cu with increasing coverage, where interfacial energy dominates. While at relatively higher deposition energy (a few eV), the ordered f.c.c.-like structure was observed in the first adlayer of the film formed by Al clusters depositing on Ni substrate. This characteristic is mainly attributive to the ballistic collision. Our results indicate that the surface morphology synthesized by cluster deposition could be controlled by experimental parameters, which will be helpful for controlled design of nanostructure.
Resumo:
In this paper, the deposition of C-20 fullerenes on a diamond (001)-(2x1) surface and the fabrication of C-20 thin film at 100 K were investigated by a molecular dynamics (MD) simulation using the many-body Brenner bond order potential. First, we found that the collision dynamic of a single C-20 fullerene on a diamond surface was strongly dependent on its impact energy. Within the energy range 10-45 eV, the C-20 fullerene chemisorbed on the surface retained its free cage structure. This is consistent with the experimental observation, where it was called the memory effect in "C-20-type" films [P. Melion , Int. J. Mod. B 9, 339 (1995); P. Milani , Cluster Beam Synthesis of Nanostructured Materials (Springer, Berlin, 1999)]. Next, more than one hundred C-20 (10-25 eV) were deposited one after the other onto the surface. The initial growth stage of C-20 thin film was observed to be in the three-dimensional island mode. The randomly deposited C-20 fullerenes stacked on diamond surface and acted as building blocks forming a polymerlike structure. The assembled film was also highly porous due to cluster-cluster interaction. The bond angle distribution and the neighbor-atom-number distribution of the film presented a well-defined local order, which is of sp(3) hybridization character, the same as that of a free C-20 cage. These simulation results are again in good agreement with the experimental observation. Finally, the deposited C-20 film showed high stability even when the temperature was raised up to 1500 K.
Resumo:
In this paper, the influence of the impact energy on the initial fabrication of thin films formed by low energy cluster deposition was investigated by molecular dynamics simulation of All 3 clusters depositing on Ni(0 0 1) substrate. In the case of soft-landing, (0.01 eV/atom), clusters are rearranged from I-h symmetry into fcc-like clusters on the surface. Then they aggregate each other, which result in thin film growing in 3D island mode. While, growth will be in layer-by-layer mode at the impact energy of a few electron volt due to the transient lateral spread of cluster atoms induced by dense collision cascade. This effect has been traced to collision cascade inside the cluster. which is enhanced by collision with a hard Ni substrate. (C) 2002 Elsevier Science B.V. All rights reserved.
Resumo:
The impact-induced deposition of Al13 clusters with icosahedral structure on Ni(0 0 1) surface was studied by molecular dynamics (MD) simulation using Finnis–Sinclair potentials. The incident kinetic energy (Ein) ranged from 0.01 to 30 eV per atom. The structural and dynamical properties of Al clusters on Ni surfaces were found to be strongly dependent on the impact energy. At much lower energy, the Al cluster deposited on the surface as a bulk molecule. However, the original icosahedral structure was transformed to the fcc-like one due to the interaction and the structure mismatch between the Al cluster and Ni surface. With increasing the impinging energy, the cluster was deformed severely when it contacted the substrate, and then broken up due to dense collision cascade. The cluster atoms spread on the surface at last. When the impact energy was higher than 11 eV, the defects, such as Al substitutions and Ni ejections, were observed. The simulation indicated that there exists an optimum energy range, which is suitable for Al epitaxial growth in layer by layer. In addition, at higher impinging energy, the atomic exchange between Al and Ni atoms will be favourable to surface alloying.
Resumo:
The deposition of hyperthermal CH3 on diamond (001)-(2×1) surface at room temperature has been studied by means of molecular dynamics simulation using the many-body hydrocarbon potential. The energy threshold effect has been observed. That is, with fixed collision geometry, chemisorption can occur only when the incident energy of CH3 is above a critical value (Eth). Increasing the incident energy, dissociation of hydrogen atoms from the incident molecule was observed. The chemisorption probability of CH3 as a function of its incident energy was calculated and compared with that of C2H2. We found that below 10 eV, the chemisorption probability of C2H2 is much lower than that of CH3 on the same surface. The interesting thing is that it is even lower than that of CH3 on a hydrogen covered surface at the same impact energy. It indicates that the reactive CH3 molecule is the more important species than C2H2 in diamond synthesis at low energy, which is in good agreement with the experimental observation.
Resumo:
In this paper, the collision of a C36, with D6h symmetry, on diamond (001)-(/2×1) surface was investigated using molecular dynamics (MD) simulation based on the semi-empirical Brenner potential. The incident kinetic energy of the C36 ranges from 20 to 150 eV per cluster. The collision dynamics was investigated as a function of impact energy Ein. The C36 cluster was first impacted towards the center of two dimers with a fixed orientation. It was found that when Ein was lower than 30 eV, C36 bounces off the surface without breaking up. Increasing Ein to 30-45 eV, bonds were formed between C36 and surface dimer atoms, and the adsorbed C36 retained its original free-cluster structure. Around 50-60 eV, the C36 rebounded from the surface with cage defects. Above 70 eV, fragmentation both in the cluster and on the surface was observed. Our simulation supported the experimental findings that during low-energy cluster beam deposition small fullerenes could keep their original structure after adsorption (i.e. the memory effect), if Ein is within a certain range. Furthermore, we found that the energy threshold for chemisorption is sensitive to the orientation of the incident C36 and its impact position on the asymmetric surface.
Resumo:
This thesis highlights the limitations of the existing car following models to emulate driver behaviour for safety study purposes. It also compares the capabilities of the mainstream car following models emulating driver behaviour precise parameters such as headways and Time to Collisions. The comparison evaluates the robustness of each car following model for safety metric reproductions. A new car following model, based on the personal space concept and fish school model is proposed to simulate more precise traffic metrics. This new model is capable of reflecting changes in the headway distribution after imposing the speed limit form VSL systems. This research facilitates assessing Intelligent Transportation Systems on motorways, using microscopic simulation.
Resumo:
Taxation law can be an incredibly complex subject to absorb, particularly when time is limited. Written specifically for students, Principles of Taxation Law 2013 brings much needed clarity to this area of law. Utilising many methods to make this often daunting subject achievable, particular features of the 2013 edition include: • seven parts: overview and structure, principles of income, deductions and offsets, timing issues, investment and business entities, tax avoidance and administration, and indirect taxes; • clearly structured chapters within those parts grouped under helpful headings; • flowcharts, diagrams and tables, end of chapter practice questions, and case summaries; • an appendix containing all of the up to date and relevant rates; and • the online self-testing component mentor, which provides questions for students of both business and law. Every major aspect of the Australian tax system is covered, with chapters on topics such as goods and services tax, superannuation, offsets, partnerships, capital gains tax, trusts, company tax and tax administration. All chapters have been thoroughly revised. Principles of Taxation Law 2013 is the perfect tool to guide the reader from their initial exposure to the subject to success in taxation law exams.
Resumo:
Increasingly, the effectiveness of the present system of taxation of international businesses is being questioned. The problem associated with the taxation of such businesses is twofold. A system of international taxation must be a fair and equitable system, distributing profits between the relevant jurisdictions and, in doing so, avoiding double taxation. At the same time, the prevention of fiscal evasion must be secured. In an attempt to achieve a fair and equitable system Australia adopts unilateral, bilateral and multilateral measures to avoid double taxation and restrict the avoidance of tax. The first step in ascertaining the international allocation of business income is to consider the taxation of business income according to domestic law, that is, the unilateral measures. The treatment of international business income under the Australian domestic law, that is, the Income Tax Assessment Act 1936 (Cth) and Income Tax Assessment Act 1997 (Cth), will depend on two concepts, first, whether the taxpayer is a resident of Australia and secondly, whether the income is sourced in Australia. After the taxation of business profits has been determined according to domestic law it is necessary to consider the applicability of the bilateral measures, that is, the Double Tax Agreements (DTAs) to which Australia is a party, as the DTAs will override the domestic law where there is any conflict. Australia is a party to 40 DTAs with another seven presently being negotiated. The preamble to Australia's DTAs provides that the purpose of such agreements is 'to conclude an Agreement for the avoidance of double taxation and the prevention of fiscal evasion with respect to taxes on income'. Both purposes, for different reasons, are equally important. It has been said that: The taxpayer hopes the treaty will prevent the double taxation of his income; the tax gatherer hopes the treaty will prevent fiscal evasion; and the politician just hopes. The first purpose, the avoidance of double taxation, is achieved through the provision of rules whereby the Contracting States agree to the classification of income and the allocation of that income to a particular State. In this sense DTAs do not allocate jurisdiction to tax but rather provide an arrangement whereby the States agree to restrict their substantive law. The restriction is either through the non-taxing of the income or via the provision of a tax credit.
Resumo:
Indigenous peoples have survived the most inhumane acts and violations against them. Despite acts of genocide, Aboriginal Australians and Native Americans have survived. The impact of the past 500 years cannot be separated from understandings of education for Native Americans in the same way that the impact of the past 220 years cannot be separated from the understandings of Australian Aboriginal people’s experiences of education. This chapter is about comparisons in Aboriginal and Native American communities and their collision with the dominant, white European settlers who came to Australia and America. Chomsky (Intervention in Vietnam and Central America: parallels and differences. In: Peck J (ed) The Chomsky Reader. Pantheon Books, New York, p 315, 1987) once remarked that if one took two historical events and compared them for similarities and differences, you would find both. The real test was whether on the similarities they were significant. The position of the coauthors of this chapter is in the affirmative and we take this occasion to lay them out for analysis and review. The chapter begins with a discussion of the historical legacy of oppression and colonization impacting upon Indigenous peoples in Australia and in the United States, followed by a discussion of the plight of Indigenous children in a specific State in America. Through the lens of social justice, we examine those issues and attitudes that continue to subjugate these same peoples in the economic and educational systems of both nations. The final part of the chapter identifies some implications for school leadership.
Resumo:
This study is an inquiry into early childhood teacher professional identities. In Australia, workforce reforms in early childhood include major shifts in qualification requirements that call for a university four-year degree-qualified teacher to be employed in child care. This marks a shift in the early years workforce, where previously there was no such requirement. At the same time as these reforms to quality measures are being implemented, and requiring a substantive up skilling of the workforce, there is a growing body of evidence through recent studies that suggests these same four-year degree-qualified early childhood teachers have an aversion to working in child care. Their preferred employment option is to work in the early years of more formal schooling, not in before-school contexts. This collision of agendas warrants investigation. This inquiry is designed to investigate the site at which advocacy for higher qualification requirements meets early childhood teachers who are reluctant to choose child care as a possible career pathway. The key research question for this study is: How are early childhood teachers’ professional identities currently produced? The work of this thesis is to problematise the early childhood teacher in child care through a particular method of discourse analysis. There are two sets of data. The first was a key early childhood political document that read as a "moment of arising" (Foucault, 1984a, p. 83). It is a political document which was selected for its current influence on the early childhood field, and in particular, workforce reforms that call for four-year degree-qualified teachers to work in before-school contexts, including child care. The second data set was generated through four focus group discussions conducted with preservice early childhood teachers. The document and transcripts of the focus groups were both analysed as text, as conceptualised by Foucault (1981). Foucault’s work spans a number of years and a range of philosophical matters. This thesis draws particularly on Foucault’s writings on discourse, power/knowledge, regimes of truth and resistance. In order to consider the production of early childhood teachers’ professional identities, the study is also informed by identity theorists, who have worked on gender, performativity and investment (Davies, 2004/2006; McNay, 1992; Osgood, 2012; Walkerdine, 1990; Weedon, 1997). The ways in which discourses intersect, compete and collide produce the subject (Foucault, 1981) and, in the case of this inquiry, there are a number of competing discourses at play, which produce the early childhood teacher. These particular theories turn particular lenses on the question of professional identities in early childhood, and such a study calls for the application of particular methodologies. Discourse analysis was used as the methodological framework, and the analysis was informed by Foucauldian concepts of discourse. While Foucault did not prescribe a form of discourse analysis as a method, his writings nonetheless provide a valuable framework for illuminating discursive practices and, in turn, how people are affected, through the shifts and distribution of power (Foucault, 1980a). The treatment used with both data sets involved redescription. For the policy document, a technique for reading document-as-text applied a genealogical approach (Foucault, 1984a). For the focus groups, the process of redescription (Rorty, 1989) involved reading talk-as-text. As a method, redescription involves describing "lots and lots of things in new ways until you have created a pattern of linguistic behaviour which will tempt the new generation to adopt it" (Rorty, 1989, p. 9). The development and application of categories (Davies, 2004/2006) built on a poststructuralist theoretical framework and the literature review informed the data analysis method of discourse analysis. Irony provided a rhetorical and playful tool (Haraway, 1991; Rorty, 1989), to look to how seemingly opposing discourses are held together. This opens a space to collapse binary thinking and consider seemingly contradictory terms in a way in which both terms are possible and both are true. Irony resists the choice of one or the other being right, and holds the opposites together in tension. The thesis concludes with proposals for new, ironic categories, which work to bring together seemingly opposing terms, located at sites in the field of early childhood where discourses compete, collide and intersect to produce and maintain early childhood teacher professional identities. The process of mapping these discourses goes some way to investigating the complexities about identities and career choices of early childhood teachers. The category of "the cost of loving" captures the collision between care/love, inherent in child care, and new discourses of investment/economics. Investment/economics has not completely replaced care/love, and these apparent opposites were not read as a binary because both are necessary and both are true (Haraway, 1991). They are held together in tension to produce early childhood teacher professional identities. The policy document under scrutiny was New Directions, released in 2007 by the then opposition ALP leader, Kevin Rudd. The claim was made strongly that the "economic prosperity" of Australia relies on investment in early childhood. The arguments to invest are compelling and the neuroscience/brain research/child development together with economic/investment discourses demand that early childhood is funding is increased. The intersection of these discourses produces professional identities of early childhood teachers as a necessary part of the country’s economy, and thus, worthy of high status. The child care sector and work in child care settings are necessary, with children and the early childhood teacher playing key roles in the economy of the nation. Through New Directions it becomes sayable (Foucault, 1972/1989) that the work the early childhood teacher performs is legitimated and valued. The children are produced as "economic units". A focus on what children are able to contribute to the future economy of the nation re-positions children and produces these "smart productive citizens", making future economic contribution. The early childhood teacher is produced through this image of a child and "the cost of loving" is emphasised. A number of these categories were produced through the readings of the document-as text and the talk-as-text. Two ironic categories were read in the analysis of the transcripts of the focus group discussions, when treated as talk-as-text data: the early childhood teacher as a "heroic victim"; and the early childhood teacher as a "glorified babysitter". This thesis raises new questions about professional identities in early childhood. These new questions might go some way to prompt re-thinking of some government policy, as well as some aspects of early childhood teacher education course design. The images of children and images of child care provide provocations to consider preservice teacher education course design. In particular, how child care, as one of the early childhood contexts, is located, conceptualised and spoken throughout the course. Consideration by course designers and teacher educators of what discourses are privileged in course content —what discourses are diminished or silenced—would go some way to reconceptualising child care within preservice teacher education and challenging dominant ways of speaking child care, and work in child care. This inquiry into early childhood teachers’ professional identities has gone some way to exploring the complexities around the early childhood teacher in child care. It is anticipated that the significance of this study will thus have immediate applicably and relevance for the Australian early childhood policy landscape. The early childhood field is in a state of rapid change, and this inquiry has examined some of the disconnects between policy and practice. Awareness of the discourses that are in play in the field will continue to allow space for conversations that challenge dominant assumptions about child care, work in child care and ways of being an early childhood teacher in child care.
Resumo:
This paper describes a risk model for estimating the likelihood of collisions at low-exposure railway level crossings, demonstrating the effect that differences in safety integrity can have on the likelihood of a collision. The model facilitates the comparison of safety benefits between level crossings with passive controls (stop or give-way signs) and level crossings that have been hypothetically upgraded with conventional or low-cost warning devices. The scenario presented illustrates how treatment of a cross-section of level crossings with low cost devices can provide a greater safety benefit compared to treatment with conventional warning devices for the same budget.
Resumo:
In recent years, carbon has been increasingly rendered ‘visible’ both discursively and through political processes that have imbued it with economic value. Greenhouse gas (GHG) emissions have been constructed as social and environmental costs and their reduction or avoidance as social and economic gain. The ‘marketisation’ of carbon, which has been facilitated through various compliance schemes such as the European Union Emissions Trading Scheme (EU ETS), the Kyoto Protocol, the proposed Australian Emissions Reduction Scheme and through the voluntary carbon credit market, have attempted to bring carbon into the ‘foreground’ as an economic liability and/or opportunity. Accompanying the increasing economic visibility of carbon are reports of frauds and scams – the ‘gaming of carbon markets’(Chan 2010). As Lohmann (2010: 21) points out, ‘what are conventionally classed as scams or frauds are an inevitable feature of carbon offset markets, not something that could be eliminated by regulation targeting the specific businesses or state agencies involved’. This paper critiques the disparate discourses of fraud risk in carbon markets and examines cases of fraud within emerging landscapes of green criminology.