965 resultados para Special operations (Military science)
Resumo:
With this special issue, we draw attention to the growing and diverse field of HCI researchers exploring the interstices of food, technology and everyday practices. This special issue builds on the CHI workshop of the same name (Comber et al., 2012a), where we brought together the community of researchers that take food as a point from which to understand people and design technology. The workshop aimed to ‘to attend to the practical and theoretical difficulties in designing for human–food interactions in everyday life’ identifying four thematic areas of food practices – health and wellbeing; sustainability; food experiences; and alternative food cultures. These practical and theoretical difficulties are evident in the papers that we present here, though the distinction between our four themes, premised by complexities of food practices, is a little less evident. Thus, in the papers that follow we explore how the social, technological, cultural and methodological intertwine in the field of human–food interaction.
Resumo:
An Application Specific Instruction-set Processor (ASIP) is a specialized processor tailored to run a particular application/s efficiently. However, when there are multiple candidate applications in the application’s domain it is difficult and time consuming to find optimum set of applications to be implemented. Existing ASIP design approaches perform this selection manually based on a designer’s knowledge. We help in cutting down the number of candidate applications by devising a classification method to cluster similar applications based on the special-purpose operations they share. This provides a significant reduction in the comparison overhead while resulting in customized ASIP instruction sets which can benefit a whole family of related applications. Our method gives users the ability to quantify the degree of similarity between the sets of shared operations to control the size of clusters. A case study involving twelve algorithms confirms that our approach can successfully cluster similar algorithms together based on the similarity of their component operations.
Resumo:
Insulated Rail Joints (IRJs) are designed to electrically isolate two rails in rail tracks to control the signalling system for safer train operations. Unfortunately the gapped section of the IRJs is structurally weak and often fails prematurely especially in heavy haul tracks, which adversely affects service reliability and efficiency. The IRJs suffer from a number of failure modes; the railhead ratchetting at the gap is, however, regarded as the root cause and attended to in this thesis. Ratchetting increases with the increase in wheel loads; in the absence of a life prediction model, effective management of the IRJs for increased wagon wheel loads has become very challenging. Therefore, the main aim of this thesis is to determine method to predict IRJs' service life. The distinct discontinuity of the railhead at the gap makes the Hertzian theory and the rolling contact shakedown map, commonly used in the continuously welded rails, not applicable to examine the metal ratchetting of the IRJs. Finite Element (FE) technique is, therefore, used to explore the railhead metal ratchetting characteristics in this thesis, the boundary conditions of which has been determined from a full scale study of the IRJ specimens under rolling contact of the loaded wheels. A special purpose test set up containing full-scale wagon wheel was used to apply rolling wheel loads on the railhead edges of the test specimens. The state of the rail end face strains was determined using a non-contact digital imaging technique and used for calibrating the FE model. The basic material parameters for this FE model were obtained through independent uniaxial, monotonic tensile tests on specimens cut from the head hardened virgin rails. The monotonic tensile test data have been used to establish a cyclic load simulation model of the railhead steel specimen; the simulated cyclic load test has provided the necessary data for the three decomposed kinematic hardening plastic strain accumulation model of Chaboche. A performance based service life prediction algorithm for the IRJs was established using the plastic strain accumulation obtained from the Chaboche model. The predicted service lives of IRJs using this algorithm have agreed well with the published data. The finite element model has been used to carry out a sensitivity study on the effects of wheel diameter to the railhead metal plasticity. This study revealed that the depth of the plastic zone at the railhead edges is independent of the wheel diameter; however, large wheel diameter is shown to increase the IRJs' service life.
Resumo:
Waterfalls and rapids are a subject of study by scientists and scholars from a variety of academic and professional backgrounds. Unlike cave research, known as speleology, which also involves many different disciplines, the study of waterfalls is not generally regarded as a distinct branch of knowledge. Long neglected as subjects of research, waterfalls have received considerable attention since the 1980s. This paper traces the study of waterfalls from the late eighteenth century, a period when both a scientific and an aesthetic interest in landscape developed in Europe, to the present. The work of geographers, geologists and others who studied landforms and landscapes is examined, with particular attention to those who expressed a special interest in waterfalls, notably Alexander von Humboldt. The study argues that the scientific and aesthetic approaches to landscape research are not incompatible and supports the view that both are necessary for a full understanding and appreciation of the environment in which we live.
Resumo:
In this paper, an interactive planning and scheduling framework are proposed for optimising operations from pits to crushers in ore mining industry. Series of theoretical and practical operations research techniques are investigated to improve the overall efficiency of mining systems due to the facts that mining managers need to tackle optimisation problems within different horizons and with different levels of detail. Under this framework, mine design planning,mine production sequencing and mine transportation scheduling models are integrated and interacted within a whole optimisation system. The proposed integrated framework could be used by mining industry for reducing equipment costs, improving the production efficiency and maximising the net present value.
Resumo:
Scrub typhus is a vector-borne disease carried by the chigger mite. The aetiological agent is the rickettsia Orientia tsutsugamushi, which is endemic to several countries in the Asia-Pacific region, including China [1]. It is also a travel-associated disease [2] and of great importance among military personnel [3], [4]. During the Second World War, scrub typhus was associated with a higher case fatality ratio than any other infectious disease in the China-Burma-India theatre of operations 1,3. Clinical presentation in patients varies from asymptomatic to life-threatening disease [5], including acute hearing loss and multiple organ failure [6], [7]. To date, there is still no effective and reliable human vaccine against scrub typhus and no point-of-care diagnostics available [1].
Resumo:
Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.
Resumo:
More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.
Resumo:
This paper proposes a method, based on polychotomous discrete choice methods, to impute a continuous measure of income when only a bracketed measure of income is available and for only a subset of the obsevations. The method is shown to perform well with CP5 data. © 1991.
Resumo:
The recent growth of the coal seam gas industry has increased pressure on regional communities. Debate surrounding the industry is intense and a social licence to operate has yet to be granted to the industry in its entirety. This article presents an analysis of social issues surrounding the coal seam gas industry, making comparisons between two case studies: the Ranger and Jabiluka mines and the Yandicoogina mine. It presents the results of a desktop study, focussed on three topics: community identity; procedural justice and distributive justice, which provides a means for comparison and draws attention to central concerns. It is found that: power imbalances; changing community identities; potentially inequitable distributions of long term benefits and the process to distribute those benefits and negative perceptions of the industry as a whole serve to undermine the provision of a social licence to operate by communities and has the potential to impose significant negative impacts on companies within the industry.
Resumo:
This Special Issue of New Technology, Work and Employment has been prompted by the increasing awareness in many countries of the need to maintain and grow their science and innovation base. The development of science, engineering, technology and mathematics (STEM) skills and capacity is seen as vital for economic development and prosperity through its impact on national and regional research and development (R&D), technological advancement, and innovation potential.