878 resultados para distribution system planning
Resumo:
Background: Falciparum malaria is the most deadly among the four main types of human malaria. Although great success has been achieved since the launch of the National Malaria Control Programme in 1955, malaria remains a serious public health problem in China. This paper aimed to analyse the geographic distribution, demographic patterns and time trends of falciparum malaria in China. Methods: The annual numbers of falciparum malaria cases during 1992–2003 and the individual case reports of each clinical falciparum malaria during 2004–2005 were extracted from communicable disease information systems in China Center for Diseases Control and Prevention. The annual number of cases and the annual incidence were mapped by matching them to corresponding province- and county-level administrative units in a geographic information system. The distribution of falciparum malaria by age, gender and origin of infection was analysed. Time-series analysis was conducted to investigate the relationship between the falciparum malaria in the endemic provinces and the imported falciparum malaria in non-endemic provinces. Results: Falciparum malaria was endemic in two provinces of China during 2004–05. Imported malaria was reported in 26 non-endemic provinces. Annual incidence of falciparum malaria was mapped at county level in the two endemic provinces of China: Yunnan and Hainan. The sex ratio (male vs. female) for the number of cases in Yunnan was 1.6 in the children of 0–15 years and it reached 5.7 in the adults over 15 years of age. The number of malaria cases in Yunnan was positively correlated with the imported malaria of concurrent months in the non-endemic provinces. Conclusion: The endemic area of falciparum malaria in China has remained restricted to two provinces, Yunnan and Hainan. Stable transmission occurs in the bordering region of Yunnan and the hilly-forested south of Hainan. The age and gender distribution in the endemic area is characterized by the predominance of adult men cases. Imported falciparum malaria in the non-endemic area of China, affected mainly by the malaria transmission in Yunnan, has increased both spatially and temporally. Specific intervention measures targeted at the mobile population groups are warranted.
Resumo:
There is a growing interest in the use of megavoltage cone-beam computed tomography (MV CBCT) data for radiotherapy treatment planning. To calculate accurate dose distributions, knowledge of the electron density (ED) of the tissues being irradiated is required. In the case of MV CBCT, it is necessary to determine a calibration-relating CT number to ED, utilizing the photon beam produced for MV CBCT. A number of different parameters can affect this calibration. This study was undertaken on the Siemens MV CBCT system, MVision, to evaluate the effect of the following parameters on the reconstructed CT pixel value to ED calibration: the number of monitor units (MUs) used (5, 8, 15 and 60 MUs), the image reconstruction filter (head and neck, and pelvis), reconstruction matrix size (256 by 256 and 512 by 512), and the addition of extra solid water surrounding the ED phantom. A Gammex electron density CT phantom containing EDs from 0.292 to 1.707 was imaged under each of these conditions. The linear relationship between MV CBCT pixel value and ED was demonstrated for all MU settings and over the range of EDs. Changes in MU number did not dramatically alter the MV CBCT ED calibration. The use of different reconstruction filters was found to affect the MV CBCT ED calibration, as was the addition of solid water surrounding the phantom. Dose distributions from treatment plans calculated with simulated image data from a 15 MU head and neck reconstruction filter MV CBCT image and a MV CBCT ED calibration curve from the image data parameters and a 15 MU pelvis reconstruction filter showed small and clinically insignificant differences. Thus, the use of a single MV CBCT ED calibration curve is unlikely to result in any clinical differences. However, to ensure minimal uncertainties in dose reporting, MV CBCT ED calibration measurements could be carried out using parameter-specific calibration measurements.
Resumo:
Background: Understanding the spatial distribution of suicide can inform the planning, implementation and evaluation of suicide prevention activity. This study explored spatial clusters of suicide in Australia, and investigated likely socio-demographic determinants of these clusters. Methods: National suicide and population data at a statistical local area (SLA) level were obtained from the Australian Bureau of Statistics for the period of 1999 to 2003. Standardised mortality ratios (SMR) were calculated at the SLA level, and Geographic Information System (GIS) techniques were applied to investigate the geographical distribution of suicides and detect clusters of high risk in Australia. Results: Male suicide incidence was relatively high in the northeast of Australia, and parts of the east coast, central and southeast inland, compared with the national average. Among the total male population and males aged 15 to 34, Mornington Shire had the whole or a part of primary high risk cluster for suicide, followed by the Bathurst-Melville area, one of the secondary clusters in the north coastal area of the Northern Territory. Other secondary clusters changed with the selection of cluster radius and age group. For males aged 35 to 54 years, only one cluster in the east of the country was identified. There was only one significant female suicide cluster near Melbourne while other SLAs had very few female suicide cases and were not identified as clusters. Male suicide clusters had a higher proportion of Indigenous population and lower median socio-economic index for area (SEIFA) than the national average, but their shapes changed with selection of maximum cluster radii setting. Conclusion: This study found high suicide risk clusters at the SLA level in Australia, which appeared to be associated with lower median socio-economic status and higher proportion of Indigenous population. Future suicide prevention programs should focus on these high risk areas.
Resumo:
In this paper a combined subtransmission and distribution reliability analysis of SEQEB’s outer suburban network is presented. The reliability analysis was carried out with a commercial software package which evaluates both energy and customer indices. Various reinforcement options were investigated to ascertain the impact they have on the reliability of supply seen by the customers. The customer and energy indices produced by the combined subtransmission and distribution reliability studies contributed to optimise capital expenditure to the most effective areas of the network.
Resumo:
Waste management and minimisation is considered to be an important issue for achieving sustainability in the construction industry. Retrofit projects generate less waste than demolitions and new builds, but they possess unique features and require waste management approaches that are different to traditional new builds. With the increasing demand for more energy efficient and environmentally sustainable office spaces, the office building retrofit market is growing in capital cities around Australia with a high level of refurbishment needed for existing aging properties. Restricted site space and uncertain delivery process in these projects make it a major challenge to manage waste effectively. The labour-intensive nature of retrofit projects creates the need for the involvement of small and medium enterprises (SMEs) as subcontractors in on-site works. SMEs are familiar with on-site waste generation but are not as actively motivated and engaged in waste management activities as the stakeholders in other construction projects in the industry. SMEs’ responsibilities for waste management in office building retrofit projects need to be identified and adapted to the work delivery processes and the waste management system supported by project stakeholders. The existing literature provides an understanding of how to manage construction waste that is already generated and how to increase the waste recovery rate for office building retrofit projects. However, previous research has not developed theories or practical solutions that can guide project stakeholders to understand the specific waste generation process and effectively plan for and manage waste in ongoing project works. No appropriate method has been established for the potential role and capability of SMEs to manage and minimise waste from their subcontracting works. This research probes into the characteristics of office building retrofit project delivery with the aim to develop specific tools to manage waste and incorporate SMEs in this process in an appropriate and effective way. Based on an extensive literature review, the research firstly developed a questionnaire survey to identify the critical factors of on-site waste generation in office building retrofit projects. Semi-structured interviews were then utilised to validate the critical waste factors and establish the interrelationships between the factors. The interviews served another important function of identifying the current problems of waste management in the industry and the performance of SMEs in this area. Interviewees’ opinions on remedies to the problems were also collected. On the foundation of the findings from the questionnaire survey and semi-structured interviews, two waste planning and management strategies were identified for the dismantling phase and fit-out phase of office building retrofit projects, respectively. Two models were then established to organize SMEs’ waste management activities, including a work process-based integrated waste planning model for the dismantling phase and a system dynamics model for the fit-out phase. In order to apply the models in real practice, procedures were developed to guide SMEs’ work flow in on-site waste planning and management. In addition, a collaboration framework was established for SMEs and other project stakeholders for effective waste planning and management. Furthermore, an organisational engagement strategy was developed to improve SME waste management practices. Three case studies were conducted to validate and finalise the research deliverables. This research extends the current literature that mostly covers waste management plans in new build projects, by presenting the knowledge and understanding of addressing waste problems in retrofit projects. It provides practical tools and guidance for industry practitioners to effectively manage the waste generation processes in office building retrofit projects. It can also promote industry-level recognition of the role of SMEs and their performance in on-site waste management.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Ocean gliders constitute an important advance in the highly demanding ocean monitoring scenario. Their effciency, endurance and increasing robustness make these vehicles an ideal observing platform for many long term oceanographic applications. However, they have proved to be also useful in the opportunis-tic short term characterization of dynamic structures. Among these, mesoscale eddies are of particular interest due to the relevance they have in many oceano-graphic processes.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.
Resumo:
Series reactors are used in distribution grids to reduce the short-circuit fault level. Some of the disadvantages of the application of these devices are the voltage drop produced across the reactor and the steep front rise of the transient recovery voltage (TRV), which generally exceeds the rating of the associated circuit breaker. Simulations were performed to compare the characteristics of a saturated core High-Temperature Superconducting Fault Current Limiter (HTS FCL) and a series reactor. The design of the HTS FCL was optimized using the evolutionary algorithm. The resulting Pareto frontier curve of optimum solution is presented in this paper. The results show that the steady-state impedance of an HTS FCL is significantly lower than that of a series reactor for the same level of fault current limiting. Tests performed on a prototype 11 kV HTS FCL confirm the theoretical results. The respective transient recovery voltages (TRV) of the HTS FCL and an air core reactor of comparable fault current limiting capability are also determined. The results show that the saturated core HTS FCL has a significantly lower effect on the rate of rise of the circuit breaker TRV as compared to the air core reactor. The simulations results are validated with shortcircuit test results.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.
Resumo:
This paper presents a new approach for the inclusion of human expert cognition into autonomous trajectory planning for unmanned aerial systems (UASs) operating in low-altitude environments. During typical UAS operations, multiple objectives may exist; therefore, the use of multicriteria decision aid techniques can potentially allow for convergence to trajectory solutions which better reflect overall mission requirements. In that context, additive multiattribute value theory has been applied to optimize trajectories with respect to multiple objectives. A graphical user interface was developed to allow for knowledge capture from a human decision maker (HDM) through simulated decision scenarios. The expert decision data gathered are converted into value functions and corresponding criteria weightings using utility additive theory. The inclusion of preferences elicited from HDM data within an automated decision system allows for the generation of trajectories which more closely represent the candidate HDM decision preferences. This approach has been demonstrated in this paper through simulation using a fixed-wing UAS operating in low-altitude environments.