875 resultados para Security Studies
Resumo:
LiteSteel beam (LSB) is a cold-formed steel hollow flange channel section produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. It is commonly used as floor joists and bearers in residential, industrial and commercial buildings. Design of the LSB is governed by the Australian cold-formed steel structures code, AS/NZS 4600. Due to the geometry of the LSB, as well as its unique residual stress characteristics and initial geometric imperfections resultant of manufacturing processes, currently available design equations for common cold-formed sections are not directly applicable to the LSB. Many research studies have been carried out to evaluate the behaviour and design of LSBs subject to pure bending actions and predominant shear actions. To date, however, no investigation has been conducted into the strength of LSB sections under combined bending and shear actions. Hence experimental and numerical studies were conducted to assess the combined bending and shear behaviour of LSBs. Finite element models of LSBs were developed to simulate their combined bending and shear behaviour and strength of LSBs. They were then validated by comparing the results with available experimental test results and used in a detailed parametric study. The results from experimental and finite element analyses were compared with current AS/NZS 4600 and AS 4100 design rules. Both experimental and numerical studies show that the AS/NZS 4600 design rule based on circular interaction equation is conservative in predicting the combined bending and shear capacities of LSBs. This paper presents the details of the numerical studies of LSBs and the results. In response to the inadequacies of current approaches to designing LSBs for combined bending and shear, two lower bound design equations are proposed in this paper.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
Some minerals are colloidal and show no X-ray diffraction patterns. Vibrational spectroscopy offers one of the few methods for the assessment of the structure of these types of mineral. Among this group of minerals is pitticite simply described as Fe, AsO4, SO4, H2O. The objective of this research is to determine the molecular structure of the mineral pitticite using vibrational spectroscopy. Raman microscopy offers a useful method for the analysis of such colloidal minerals. Raman and infrared bands are attributed to the , and water stretching vibrations. The Raman spectrum is dominated by a very intense sharp band at 983 cm−1 assigned to the symmetric stretching mode. A strong Raman band at 1041 cm−1 is observed and is assigned to the antisymmetric stretching mode. Low intensity Raman bands at 757 and 808 cm−1 may be assigned to the antisymmetric and symmetric stretching modes. Raman bands observed at 432 and 465 cm−1 are attributable to the doubly degenerate ν2(SO4)2- bending mode.
Resumo:
The last few years have brought an increasing interest in the chemistry of rite interstellar and circumstellar environs. Many of the molecular species discovered in remote galactic regions have been dubbed 'non-terrestrial' because of their unique structures (Thaddeus et al, 1993). These findings have provided a challenge to chemists in many differing fields to attempt to generate these unusual species in the laboratory of particular recent interest have been the unsaturated hydrocarbon families, CnH and CnH2, which have been pursued by a number of diverse methodologies. A wine range of heterocumulenes, including CnO, HCnO, CnN, HCnN, CnS, HCnS, CnSi and HCnSi have also provided intriguing targets for laboratory experiments. Strictly the term cumulene refers to a class of compounds that possess a series of adjacent double bonds, with allene representing the simplest example (H2C=C=CH2). However for many of the non-terrestrial molecules presented here, the carbon chain cannot be described in terms of a single simple valence structure, and so we use the terms cumulene and heterocumulene in a more general sense: to describe molecular species that contain an unsaturated polycarbon chain. Mass spectrometry has proved an invaluable tool in the quest for interstellar cumulenes and heterocumulenes in the laboratory it has the ability in its many forms, to (i) generate charged analogs of these species in the gas phase, (ii) probe their connectivity, ion chemistry, and thermochemistry, and (iii) in some cases, elucidate the neutrals themselves. Here, we will discuss the progress of these studies to this time. (C) 1999 John Wiley & Sons, Inc.
Resumo:
The anion radicals CnOn-. (n = 3-6) can be generated by ionization of cyclic carbonyl compounds in the negative ion mode. The ions as well as the corresponding neutral counterparts are probed by means of different mass spectrometric techniques. The results suggest that oxocarbons, i.e. cyclic polyketones, are formed under conservation of the skeletons of the precursor molecules. At least for n = 3, however, the experimental findings indicate partial rearrangement of the expected cyclopropanetrione structure to an oxycarboxylate for the anion, i.e. O-.-C=C-CO2-. For n = 4 and 6 almost complete dissociation of the neutral polyones into carbon monoxide is found, whereas for n = 5 a distinct recovery signal indicates the generation of genuine cyclopentanepentaone.
Resumo:
The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.
Resumo:
We present a determination of Delta(f)H(298)(HOO) based upon a negative. ion thermodynamic cycle. The photoelectron spectra of HOO- and DOO- were used to measure the molecular electron affinities (EAs). In a separate experiment, a tandem flowing afterglow-selected ion flow tube (FA-SIFT) was used to measure the forward and reverse rate constants for HOO- + HCdropCH reversible arrow HOOH + HCdropC(-) at 298 K, which gave a value for Delta(acid)H(298)(HOO-H). The experiments yield the following values: EA(HOO) = 1.078 +/- 0.006 eV; T-0((X) over tilde HOO - (A) over tilde HOO) = 0.872 +/- 0.007 eV; EA(DOO) = 1.077 +/- 0.005 eV; T-0((X) over tilde DOO - (A) over tilde DOO) = 0.874 +/- 0.007 eV; Delta(acid)G(298)(HOO-H) = 369.5 +/- 0.4 kcal mol(-1); and Delta(acid)H(298)(HOO-H) = 376.5 +/- 0.4 kcal mol(-1). The acidity/EA thermochemical cycle yields values for the bond enthalpies of DH298(HOO-H) = 87.8 +/- 0.5 kcal mol(-1) and Do(HOO-H) = 86.6 +/- 0.5 kcal mol(-1). We recommend the following values for the heats of formation of the hydroperoxyl radical: Delta(f)H(298)(HOO) = 3.2 +/- 0.5 kcal mol(-1) and Delta(f)H(0)(HOO) = 3.9 +/- 0.5 kcal mol(-1); we recommend that these values supersede those listed in the current NIST-JANAF thermochemical tables.
Resumo:
We have established and characterized a series of variant cell lines in which to identify the critical factors associated with E2-induced malignant progression, and the acquisition to tamoxifen resistance in human breast cancer. Sublines of the hormone-dependent MCF-7 cell line (MCF7/MIII and MCF7/LCC1) form stable, invasive, estrogen independent tumors in the mammary fat pads of ovariectomized athymic nude mice. These cells retain expression of both estrogen (ER) and progesterone receptors (PGR), but retain sensitivity to each of the major structural classes of antiestrogens. The tamoxifen-resistant MCF7/LCC2 cells retain sensitivity to the inhibitory effects of the steroidal antiestrogen ICI 182780. By comparing the parental hormone-dependent and variant hormone-independent cells, we have demonstrated an altered expression of some estrogen regulated genes (PGR, pS2, cathepsin D) in the hormone-independent variants. Other genes remain normally estrogen regulated (ER, laminin receptor, EGF-receptor). These data strongly implicate the altered regulation of a specific subset or network of estrogen regulated genes in the malignant progression of human breast cancer. Some of the primary response genes in this network may exhibit dose-response and induction kinetics similar to pS2, which is constitutively upregulated in the MCF7/MIII, MCF7/LCC1 and MCF7/LCC2 cells.
Resumo:
The prime aim of this research project is to evaluate the performance of confined masonry walls under in-plane shear with a view to contributing to the national masonry design standard through a set of design clauses. This aim stems from the criticisms of the current provisions of the in-plane shear capacity equations in the Australian Masonry Standard AS3700 (2011) being highly non-conservative. This PhD thesis is an attempt to address this gap in the knowledge through systematic investigation of the key parameters that affects the in-plane shear strength of the masonry walls through laboratory experiments and extensive finite element analyses.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
INTRODUCTION Globally, one-third of food production is lost annually due to negligent authorities. India alone loses some 21 million tonnes of wheat per year even while it has 200 million food-insecure people in the nation. Disturbingly provocative as it may sound, it is amazing how national and international institutions and governments make use of human hunger for their own survival (Raghib 2013). The global food system is increasingly insecure. Challenges to long-term global food security are encapsulated by resource scarcity, environmental degradation, biodiversity loss, climate change, reductions of farm labour and a growing world population. These issues are caused and aggravated by the spread of corporatised and monopolised food systems, dietary change, and urbanisation. These factors have rapidly brought food insecurity under the umbrella of unconventional security threats (Heukelom 2011). For some, humanitarian crises associated with food insecurity, or what has been dubbed ‘the silent tsunami’, is a pending peril, notably for the world’s poorest and most vulnerable people. For others, the food production industry is an emerging market with unprecedented profits. Despite this problem of food scarcity we are witnessing extraordinary ‘food wastage’, notably in North America and Europe, on a scale that would reportedly be capable of feeding the world’s hungry six times over (Stuart 2012). As the opening quotation to this chapter suggests, governments and corporations are deeply involved in the contexts, politics, and resources associated with food related issues. As many economically developed and advanced industrial nations are reporting a rise out of recession, announcements are made by the world’s richest countries that they are to cut $US2 billion per year from food aid. The head of the World Food Aid Programme, Rosette Sheeran, warns that such cuts could result in ‘the loss of a generation’ (Walters 2011). The global food crisis has also reinvigorated debates about agricultural development and genetically modified (GM) food; as well as fuelling debates about poverty, debt and security. This chapter provides a discussion of the political economy of global food debates and explores the threats and opportunities surrounding food production and future food security.
Resumo:
In this paper, we present the results of a survey conducted to measure the attitudes of the consumers of eHealth towards Accountable-eHealth systems which are designed for information privacy management. A research model is developed that can identify the factors contributing to system acceptance and is validated using quantitative data from 187 completed survey responses from university students studying non-health related courses at a university in Queensland, Australia. The research model is validated using structural equation modelling and can be used to identify how specific characteristics of Accountable-eHealth systems would affect their overall acceptance by future eHealth consumers.
Resumo:
This paper strives to identify barriers that hamper eHealth implementation from different perspectives. The benefits offered by eHealth and the need for eHealth preparedness is first discussed. This is followed by a discussion on the integral components of a robust eHealth infrastructure. Then, the barriers to eHealth such as technical interoperability issues, lack of holistic approach and technology disconnect are explained in detail. Finally, solutions to promote better adoption of eHealth through government policies, standardisation and training are also discussed.