885 resultados para Entanglement Capability


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an innovative prognostics model based on health state probability estimation embedded in the closed loop diagnostic and prognostic system. To employ an appropriate classifier for health state probability estimation in the proposed prognostic model, the comparative intelligent diagnostic tests were conducted using five different classifiers applied to the progressive fault levels of three faults in HP-LNG pump. Two sets of impeller-rubbing data were employed for the prediction of pump remnant life based on estimation of discrete health state probability using an outstanding capability of SVM and a feature selection technique. The results obtained were very encouraging and showed that the proposed prognosis system has the potential to be used as an estimation tool for machine remnant life prediction in real life industrial applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Design for Manufacturing (DFM) is a highly integral methodology in product development, starting from the concept development phase, with the aim of improving manufacturing productivity. It is used to reduce manufacturing costs in complex production environments, while maintaining product quality. While Design for Assembly (DFA) is focusing on elimination or combination of parts with other components, which in most cases relates to performing a function and manufacture operation in a simpler way, DFM is following a more holistic approach. Common consideration for DFM are standard components, manufacturing tool inventory and capability, materials compatibility with production process, part handling, logistics, tool wear and process optimization, quality control complexity or Poka-Yoke design. During DFM, the considerable background work required for the conceptual phase is compensated for by a shortening of later development phases. Current DFM projects normally apply an iterative step-by-step approach and eventually transfer to the developer team. The study is introducing a new, knowledge based approach to DFM, eliminating steps of DFM, and showing implications on the work process. Furthermore, a concurrent engineering process via transparent interface between the manufacturing engineering and product development systems is brought forward.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We studied 561 young firms in Australia to understand the involvement of immigrant entrepreneurs (IE) in international new ventures (INV). We found that IE are over-represented in INV and have many characteristics known to facilitate INV success including more founders, university degree, international connections and technical capability. Our study has implications for immigration policy and economic policy and the efficient use of a nation’s human capital. This research challenges a necessity-based stereotype of immigrant entrepreneurs by identifying areas in which immigrant entrepreneurs have natural competitive advantages over native entrepreneurs. This research makes a contribution to the theory of immigrant entrepreneurship by identifying the significant role of immigrant entrepreneurs in INV and the suitability of immigrant entrepreneurs for the development INV. We inform diverse streams of research in transnational and immigrant entrepreneurship with broader strategic work on the creation of INV.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On 20 September 2001, the former US President, George W. Bush, declared what is now widely, and arguably infamously, known as a ‘war on terror’. In response to the fatal 9/11 attacks in New York and Washington, DC, President Bush identified the US military response as having far-reaching and long-lasting consequences. It was, he argued, ‘our war on terror’ that began ‘with al Qaeda, but … it will not end until every terrorist group of global reach has been found, stopped and defeated’ (CNN 2001). This was to be a war that would, in the words of former British Prime Minister, Tony Blair, seek to eliminate a threat that was ‘aimed at the whole democratic world’ (Blair 2001). Blair claimed that this threat is of such magnitude that unprecedented measures would need to be taken to uphold freedom and security. Blair would later admit that it was a war that ‘divided the country’ and was based on evidence ‘about Saddam having actual biological and chemical weapons, as opposed to the capability to develop them, has turned out to be wrong’ (Blair 2004). The failures of intelligence ushered in new political rhetoric in the form of ‘trust me’ because ‘instinct is no science’ (Blair 2004). The war on terror has been one of the most significant international events in the past three decades, alongside the collapse of the former Soviet Union, the end of apartheid in South Africa, the unification of Europe and the marketization of the People's Republic of China. Yet, unlike the other events, it will not be remembered for advancing democracy or sovereignty, but for the conviction politics of particular politicians who chose to dispense with international law and custom in pursuit of personal instincts that proved fatal. Since the invasions of Afghanistan in October 2001 and …

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book is an empirical study of strategic management practices in the construction industry. It examines the dynamic capabilities paradigm within the context of the Indonesian construction industry. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organizational performance. In doing so, this study fills an important gap in the empirical literature and reinforces the dynamic capabilities framework’s recognition as a rigorous theory of strategic management. As the dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Raman spectroscopy, when used in spatially offset mode, has become a potential tool for the identification of explosives and other hazardous substances concealed in opaque containers. The molecular fingerprinting capability of Raman spectroscopy makes it an attractive tool for the unambiguous identification of hazardous substances in the field. Additionally, minimal sample preparation is required compared with other techniques. We report a field portable time resolved Raman sensor for the detection of concealed chemical hazards in opaque containers. The new sensor uses a pulsed nanosecond laser source in conjunction with an intensified CCD detector. The new sensor employs a combination of time and space resolved Raman spectroscopy to enhance the detection capability. The new sensor can identify concealed hazards by a single measurement without any chemometric data treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Having IT-related capabilities is not enough to secure value from IT resources and survive in today’s competitive environment. IT resources evolve dynamically and firms must sustain their existing capabilities to continue to leverage value from their IT resources. Firm’s human resources are an important IT-related capability, and an important source of their competitive advantage. Using a field survey, this study demonstrates that a dynamic end-user environment, a result of a coordinated change in complementary factors can help sustain firms’ IT-related management capabilities. These factors include an appropriate organizational design to decision rights and work environment and a congruent reward system. This study adds an important dimension in understanding why some firms continue to perform better with their IT resources than others. For practice, this study suggests that a comprehensive approach to what constitutes valuable organizational resources is necessary.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With new photocatalysts of gold nanoparticles supported on zeolite supports (Au/zeolite), oxidation of benzyl alcohol and its derivatives into the corresponding aldehydes can proceed well with a high selectivity (99%) under visible light irradiation at ambient temperature. Au/zeolite photocatalysts were characterized by UV/Vis, XPS, TEM, XRD, EDS, BET, IR, and Raman techniques. The Surface Plasmon Resonance (SPR) effect of gold nanoparticles, the adsorption capability of zeolite supports, and the molecular polarities of aromatic alcohols were demonstrated to have an essential correlation with the photocatalytic performances. In addition, the effects of light intensity, wavelength range, and the role of molecular oxygen were investigated in detail. The kinetic study indicated that the visible light irradiation required much less apparent activation energy for photooxidation compared with thermal reaction. Based on the characterization data and the photocatalytic performances, we proposed a possible photooxidation mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Retrofit projects are different from newly-built projects in many respects. A retrofit project involves an existing building, which imposes constraints on the owners, designers, operators and constructors throughout the project process. Retrofit projects are risky, complex, less predictable and difficult to be well planned, which need greater coordination. For office building retrofit project, further restrictions will apply as these buildings often locate in CBD areas and most have to remain operational during the progression of project work. Issues such as site space, material storage and handling, noise and dust, need to be considered and well addressed. In this context, waste management is even more challenging with small spaces for waste handling, uncertainties in waste control, and impact of waste management activities on project delivery and building occupants. Current literatures on waste management in office building retrofit projects focus on increasing waste recovery rate based on project planning, monitoring and stakeholders’ collaboration. However, previous research has not produced knowledge of understanding the particular retrofit processes and their impact on waste generation and management. This paper discusses the interim results of a continuing research on new strategies for waste management in office building retrofit projects. Firstly based on the literature review, it summarizes the unique characteristics of office building retrofit projects and their influence on waste management. An assumption on waste management strategies is formed. Semi-structured interviews were conducted towards industry practitioners and findings are then presented in the paper. The assumption of the research was validated in the interviews from the opinions and experiences of the respondents. Finally the research develops a process model for waste management in office building retrofit projects. It introduces two different waste management strategies. For the dismantling phase, waste is generated fast along with the work progress, so integrated planning for project delivery and waste generation is needed in order to organize prompt handling and treatment. For the fit-out phase, the work is similar as new construction. Factors which are particularly linked to generating waste on site need to be controlled and monitored. Continuing research in this space will help improve the practice of waste management in office building retrofit projects. The new strategies will help promote the practicality of project waste planning and management and stakeholders’ capability of coordinating waste management and project delivery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

According to a recent report Australian higher education is not in crisis. However, we could be doing it better. The report Mapping Australian Higher Education (Norton, 2012) highlights comparative weaknesses such as levels f student engagement; interactions between students and academic staff; and academic staff preferences for research over teaching. The report points out that despite these concerns most graduates continue to get good, well-paid jobs, student satisfaction is improving, and levels of public confidence in Australian higher education are high. It also stresses that ‘the promise of higher education is that it provides adaptable cognitive skills, not that it always provides the job specific skills graduates will need in their future employment’ (Norton, 2012, p.58). This is worth keeping in mind as we contribute to the significant growth in curriculum initiatives aimed at preparing graduates for the world of work. Work Integrated Learning (WIL) is not a new concept but there is increased pressure on higher education globally to address graduate employability skills. The sector is under pressure in an increasingly competitive environment to demonstrate the relevance of courses, accountability and effective use of public funds (Peach & Gamble, 2011). In the Australian context this also means responding to the skills shortage in areas such as engineering, health, construction and business (DEEWR, 2010). This paper provides a brief overview of collaborative efforts over several years to improve the activity of WIL at the Queensland University of Technology (QUT). These efforts have resulted in changes to curriculum, pedagogy, systems and processes, and the initiation of local, regional, national, and international networks. The willingness of students, staff, and industry partners to ‘get stuck in’ and try new approaches in these different contexts can be understood as a form of boundary spanning. That is, the development of the capability to mediate between different forms of expertise and the demands of different contexts in order to nurture student learning and improve the outcomes of higher education through WIL (Peach, Cates, Ilg, Jones, Lechleiter, 2011).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acoustic emission (AE) analysis is one of the several diagnostic techniques available nowadays for structural health monitoring (SHM) of engineering structures. Some of its advantages over other techniques include high sensitivity to crack growth and capability of monitoring a structure in real time. The phenomenon of rapid release of energy within a material by crack initiation or growth in form of stress waves is known as acoustic emission (AE). In AE technique, these stress waves are recorded by means of suitable sensors placed on the surface of a structure. Recorded signals are subsequently analysed to gather information about the nature of the source. By enabling early detection of crack growth, AE technique helps in planning timely retrofitting or other maintenance jobs or even replacement of the structure if required. In spite of being a promising tool, some challenges do still exist behind the successful application of AE technique. Large amount of data is generated during AE testing, hence effective data analysis is necessary, especially for long term monitoring uses. Appropriate analysis of AE data for quantification of damage level is an area that has received considerable attention. Various approaches available for damage quantification for severity assessment are discussed in this paper, with special focus on civil infrastructure such as bridges. One method called improved b-value analysis is used to analyse data collected from laboratory testing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ability of bridge deterioration models to predict future condition provides significant advantages in improving the effectiveness of maintenance decisions. This paper proposes a novel model using Dynamic Bayesian Networks (DBNs) for predicting the condition of bridge elements. The proposed model improves prediction results by being able to handle, deterioration dependencies among different bridge elements, the lack of full inspection histories, and joint considerations of both maintenance actions and environmental effects. With Bayesian updating capability, different types of data and information can be utilised as inputs. Expert knowledge can be used to deal with insufficient data as a starting point. The proposed model established a flexible basis for bridge systems deterioration modelling so that other models and Bayesian approaches can be further developed in one platform. A steel bridge main girder was chosen to validate the proposed model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the flight trials of an electro-optical (EO) sense-and-avoid system onboard a Cessna host aircraft (camera aircraft). We focus on the autonomous collision avoidance capability of the sense-and-avoid system; that is, closed-loop integration with the onboard aircraft autopilot. We also discuss the system’s approach to target detection and avoidance control, as well as the methodology of the flight trials. The results demonstrate the ability of the sense-and-avoid system to automatically detect potential conflicting aircraft and engage the host Cessna autopilot to perform an avoidance manoeuvre, all without any human intervention

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The integration of unmanned aircraft into civil airspace is a complex issue. One key question is whether unmanned aircraft can operate just as safely as their manned counterparts. The absence of a human pilot in unmanned aircraft automatically points to a deficiency that is the lack of an inherent see-and-avoid capability. To date, regulators have mandated that an “equivalent level of safety” be demonstrated before UAVs are permitted to routinely operate in civil airspace. This chapter proposes techniques, methods, and hardware integrations that describe a “sense-and-avoid” system designed to address the lack of a see-and-avoid capability in UAVs.