968 resultados para Sorin, Edward.
Resumo:
This paper provides fundamental understanding for the use of cumulative plots for travel time estimation on signalized urban networks. Analytical modeling is performed to generate cumulative plots based on the availability of data: a) Case-D, for detector data only; b) Case-DS, for detector data and signal timings; and c) Case-DSS, for detector data, signal timings and saturation flow rate. The empirical study and sensitivity analysis based on simulation experiments have observed the consistency in performance for Case-DS and Case-DSS, whereas, for Case-D the performance is inconsistent. Case-D is sensitive to detection interval and signal timings within the interval. When detection interval is integral multiple of signal cycle then it has low accuracy and low reliability. Whereas, for detection interval around 1.5 times signal cycle both accuracy and reliability are high.
Resumo:
Throughout the twentieth century the economics of the Middle East rose and fell many times in response to the external environment, including European de-colonization and the US and former USSR competing to provide military and economic aid after World War II. Throughout these upheavals the Middle East has remained internationally significant politically and economically not least for the region's large reserves of oil and gas, as discussed in the Introduction to this volume. In recent decades, Western nations have moved to invest into the Middle East in the rapidly developing technology, tourism and education industries that have proliferated. For its part, Iran has been the world's fourth largest provider of petroleum and second largest provider of natural gas and, despite years of political unrest, has made rapid expansion into information technology and telecommunications. Increased involvement in the global economy has meant that Iran has invested heavily in education and training and moved to modernize its management practices. Hitherto there has been little academic research into management in either Western or local organizations in Iran. This chapter seeks to address that gap in knowledge by exploring business leadership in Iran, with particular reference to cultural and institutional impacts.
Resumo:
Evaluating the safety of different traffic facilities is a complex and crucial task. Microscopic simulation models have been widely used for traffic management but have been largely neglected in traffic safety studies. Micro simulation to study safety is more ethical and accessible than the traditional safety studies, which only assess historical crash data. However, current microscopic models are unable to mimic unsafe driver behavior, as they are based on presumptions of safe driver behavior. This highlights the need for a critical examination of the current microscopic models to determine which components and parameters have an effect on safety indicator reproduction. The question then arises whether these safety indicators are valid indicators of traffic safety. The safety indicators were therefore selected and tested for straight motorway segments in Brisbane, Australia. This test examined the capability of a micro-simulation model and presents a better understanding of micro-simulation models and how such models, in particular car following models can be enriched to present more accurate safety indicators.
Resumo:
To achieve the sustainable use and development of water resources is a daunting challenge for both the global and local communities. It requires commitments by all groups within the international, national and local communities from their own particular, possibly conflicting, perspectives. Without a set of coherent legal arrangements designed to ensure effective governance of water resources, their sustainable use and development are unlikely to be achieved. This study looks at how the legal arrangements for managing water resources have evolved across the continents over hundreds of years; their relevance for contemporary society; how the norms of current international and national legal regimes are responding; and, most importantly, how legal rights and duties should be structured so as to achieve sustainability in the future.
Resumo:
Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.
Resumo:
The past two decades have witnessed a surge in interest in the field of nascent entrepreneurship. In this collection, the editors successfully draw together the most important works that utilize the new real-time approaches for studying early stage entrepreneurial activity that were developed and refined in the last couple of decades. Providing the empirical, theoretical and methodological insights from some of the most influential researchers in this field, this book is an indispensable source of reference for researchers, students and others who have an interest in new venture creation and its role in the economy.
Resumo:
The compressed gas industry and government agencies worldwide utilize "adiabatic compression" testing for qualifying high-pressure valves, regulators, and other related flow control equipment for gaseous oxygen service. This test methodology is known by various terms including adiabatic compression testing, gaseous fluid impact testing, pneumatic impact testing, and BAM testing as the most common terms. The test methodology will be described in greater detail throughout this document but in summary it consists of pressurizing a test article (valve, regulator, etc.) with gaseous oxygen within 15 to 20 milliseconds (ms). Because the driven gas1 and the driving gas2 are rapidly compressed to the final test pressure at the inlet of the test article, they are rapidly heated by the sudden increase in pressure to sufficient temperatures (thermal energies) to sometimes result in ignition of the nonmetallic materials (seals and seats) used within the test article. In general, the more rapid the compression process the more "adiabatic" the pressure surge is presumed to be and the more like an isentropic process the pressure surge has been argued to simulate. Generally speaking, adiabatic compression is widely considered the most efficient ignition mechanism for directly kindling a nonmetallic material in gaseous oxygen and has been implicated in many fire investigations. Because of the ease of ignition of many nonmetallic materials by this heating mechanism, many industry standards prescribe this testing. However, the results between various laboratories conducting the testing have not always been consistent. Research into the test method indicated that the thermal profile achieved (i.e., temperature/time history of the gas) during adiabatic compression testing as required by the prevailing industry standards has not been fully modeled or empirically verified, although attempts have been made. This research evaluated the following questions: 1) Can the rapid compression process required by the industry standards be thermodynamically and fluid dynamically modeled so that predictions of the thermal profiles be made, 2) Can the thermal profiles produced by the rapid compression process be measured in order to validate the thermodynamic and fluid dynamic models; and, estimate the severity of the test, and, 3) Can controlling parameters be recommended so that new guidelines may be established for the industry standards to resolve inconsistencies between various test laboratories conducting tests according to the present standards?
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
Philanthropic foundations in Australia have traditionally been labelled ‘icebergs’. Much of what they do and who they are is not apparent on the surface. Many are unknown and apart from an occasional biography, almost all are sparsely documented in terms of the very personal decisions behind establishing them. Practically and academically, scant data exist on the decision journeys people make into formalised philanthropy. This study seeks to fill that gap. It is believed to be the largest such study of foundation decision-making ever undertaken in this country. It is the latest in a series of ACPNS research into types of considered (versus spontaneous) giving in Australia. This research has been supported by the Perpetual Foundation, the EF and SL Gluyas Trust and the Edward Corbould Charitable Trust under the management of Perpetual Trustee Company Ltd.
Resumo:
This chapter proposes a conceptual model for optimal development of needed capabilities for the contemporary knowledge economy. We commence by outlining key capability requirements of the 21st century knowledge economy, distinguishing these from those suited to the earlier stages of the knowledge economy. We then discuss the extent to which higher education currently caters to these requirements and then put forward a new model for effective knowledge economy capability learning. The core of this model is the development of an adaptive and adaptable career identity, which is created through a reflective process of career self-management, drawing upon data from the self and the world of work. In turn, career identity drives the individual’s process of skill and knowledge acquisition, including deep disciplinary knowledge. The professional capability learning thus acquired includes disciplinary skill and knowledge sets, generic skills, and also skills for the knowledge economy, including disciplinary agility, social network capability, and enterprise skills. In the final part of this chapter, we envision higher education systems that embrace the model, and suggest steps that could be taken toward making the development of knowledge economy capabilities an integral part of the university experience.