924 resultados para Precise positioning


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this study was to investigate the effect of court surface (clay v hard-court) on technical, physiological and perceptual responses to on-court training. Four high-performance junior male players performed two identical training sessions on hard and clay courts, respectively. Sessions included both physical conditioning and technical elements as led by the coach. Each session was filmed for later notational analysis of stroke count and error rates. Further, players wore a global positioning satellite device to measure distance covered during each session; whilst heart rate, countermovement jump distance and capillary blood measures of metabolites were measured before, during and following each session. Additionally a respective coach and athlete rating of perceived exertion (RPE) were measured following each session. Total duration and distance covered during of each session were comparable (P>0.05; d<0.20). While forehand and backhands stroke volume did not differ between sessions (P>0.05; d<0.30); large effects for increased unforced and forced errors were present on the hard court (P>0.05; d>0.90). Furthermore, large effects for increased heart rate, blood lactate and RPE values were evident on clay compared to hard courts (P>0.05; d>0.90). Additionally, while player and coach RPE on hard courts were similar, there were large effects for coaches to underrate the RPE of players on clay courts (P>0.05; d>0.90). In conclusion, training on clay courts results in trends for increased heart rate, lactate and RPE values, suggesting sessions on clay tend towards higher physiological and perceptual loads than hard courts. Further, coaches appear effective at rating player RPE on hard courts, but may underrate the perceived exertion of sessions on clay courts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wandering is aimless and repetitive locomotion that may expose persons with dementia (PWD) to elopement, getting lost and death. This study is an Australian replication of a US study. Cross-disciplinary consensus- based analysis was applied to data from five focus groups (N =47: cognitively intact LTC residents (5), carers of PWD (11), home care workers (13) allied health professionals and health-focused engineers (7) and RNs (11). Groups received briefing about wandering monitoring and elopement management systems. Consistent with US attitudes, participants in all groups agreed on what a wandering technology should do, how it should do it, and necessary technical specifications. Within each group participants raised the need for a continuum of care for PWD and the imperative for early recognition of potentially dangerous wandering and getting lost when they occur. Global Positioning System elopement management was the preferred option. Interestingly, the prospective value of GPS to recover a lost or eloped wanderer far outweighed privacy concerns, as in the US. A pervasive theme was that technologies need to augment, but cannot replace, attentive, compassionate caregiver presence. A significant theme raised only by Australian carers of PWD was the potential for development of implantable GPS technologies and the need for public debate about attendant ethical issues. Given that 60% or more of over 200,000 Australians and 4.5 million Americans with dementia will develop wandering, there is a pressing need to develop effective locator systems that may delay institutionalization, help allay carer concern and enhance PWD safety.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to consider how libraries support the development of community networks both physically and digitally. To do this, a case-study methodology was employed, including a combination of data about the library and qualitative interviews with library users considering their experience of the library. This paper proposes that libraries act as ‘third places’ spatially connecting people; libraries also build links with online media and play a critical role in inclusively connecting non-technology users with the information on the Internet and digital technology more generally. The paper establishes the value of libraries in the digital age and recommends that libraries actively seek ways to develop links between non-technology users and activity on the Internet. It addresses the need to reach these types of non-technology users in different ways. Further, it suggests that libraries utilise their positioning as third places to create broader community networks, to support local communities beyond existing users and beyond the library precinct.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, height 182.3 ± 5.4 cm, body mass 95 ± 4 kg, VO2max 46 ± 5.7 ml.kg-1.min-1) undertook an operational scenario wearing the Med-Eng EOD 9 suit and helmet (~32 kg). The climatic conditions ranged between 27.1–31.8°C ambient temperature, 66-88% relative humidity, and 30.7-34.3°C wet bulb globe temperature. The scenario involved searching a two story non air-conditioned building for a target; carrying and positioning equipment for taking an X-ray; carrying and positioning equipment to disrupt the target; and finally clearing the site. Core temperature and heart rate were continuously monitored, and were used to calculate a physiological strain index (PSI). Urine specific gravity (USG) assessed hydration status and heat associated symptomology were also recorded. Results: The scenario was completed in 121 ± 22 mins (23.4 ± 0.4% work, 76.5 ± 0.4% rest/recovery). Maximum core temperature (38.4 ± 0.2°C), heart rate (173 ± 5.4 bpm, 94 ± 3.3% max), PSI (7.1 ± 0.4) and USG (1.031 ± 0.002) were all elevated after the simulated operation. Heat associated symptomology highlighted that moderate-severe levels of fatigue and thirst were universally experienced, muscle weakness and heat sensations experienced by 75%, and one bomb technician reported confusion and light-headedness. Conclusion: All bomb technicians demonstrated moderate-high levels of heat strain, evidenced by elevated heart rate, core body temperature and PSI. Severe levels of dehydration and noteworthy heat-related symptoms further highlight the risks to health and safety faced by bomb technicians operating in tropical locations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: This research investigates older people’s use of transportation to develop strategies for age-friendly transportation within the community. Methods: Data for this study was derived from Global Positioning System (GPS) tracking of thirteen people aged 55 years and older, together with self-report information recorded in travel diaries about daily activities undertaken outside the home over a period of seven days. Semi-structured interviews were aided by individual maps to investigate engagement in out-of-home activities and verify the recorded GPS data. Results: Overall, participants were highly reliant on the car for daily commuting. Walking, biking and public transport options were unattractive due to environmental conditions, accessibility and usability. Conclusion: Participation within the community and access to services is facilitated by private and public transportation. It is therefore critical to address accessibility and usability issues faced by older people to enable them to maintain their mobility, and ensure access to services, especially when driving ceases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Advanced substation applications, such as synchrophasors and IEC 61850-9-2 sampled value process buses, depend upon highly accurate synchronizing signals for correct operation. The IEEE 1588 Precision Timing Protocol (PTP) is the recommended means of providing precise timing for future substations. This paper presents a quantitative assessment of PTP reliability using Fault Tree Analysis. Two network topologies are proposed that use grandmaster clocks with dual network connections and take advantage of the Best Master Clock Algorithm (BMCA) from IEEE 1588. The cross-connected grandmaster topology doubles reliability, and the addition of a shared third grandmaster gives a nine-fold improvement over duplicated grandmasters. The performance of BMCA mediated handover of the grandmaster role during contingencies in the timing system was evaluated experimentally. The 1 µs performance requirement of sampled values and synchrophasors are met, even during network or GPS antenna outages. Slave clocks are shown to synchronize to the backup grandmaster in response to degraded performance or loss of the main grandmaster. Slave disturbances are less than 350 ns provided the grandmaster reference clocks are not offset from one another. A clear understanding of PTP reliability and the factors that affect availability will encourage the adoption of PTP for substation time synchronization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents an assessment of the coprecipitation technique for the reliable production of high-temperature superconducting (HTS) copper-oxide powders in quantities scaled up to 1 kg. This process affords precise control of cation stoichiometry (< 4% relative), occurs rapidly (almost instantaneously) and can be suitably developed for large-scale (e.g. tonne) manufacture of HTS materials. The process is based upon a simple control of the chemistry of the cation solution and precipitation with oxalic acid. This coprecipitation method is applicable to all copper-oxides and has been demonstrated in this work using over thirty separate experiments for the following compositions: YBa2Cu3O7-δ, Y2BaCuO5 and YBa2Cu4O8. The precursor powders formed via this coprecipitation process are fine-grained (∼ 5-10 nm), chemically homogeneous at the nanometer scale and reactive, Conversion to phase-pure HTS powders can therefore occur in minutes at appropriate firing temperatures. © 1995.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effect of HCl on authigenic chlorite in three different sandstones has been examined uisng an Environmental Scanning Electron Microscope (ESEM), together with conventional analytical techniques. The ESEM enabled chlorites to be directly observed in situ at high magnifications during HCl treatment, and was particularly effective in allowing the same chlorite areas to be closely compared before and after acid treatment. Chlorites were reacted with 1M to 10M HCl at temperatures up to 80°C and for periods up to five months. After all treatments, chlorites show extensive leaching of iron, magnesium and aluminum, and their crystalline structure is destroyed. However, despite these major compositional and structural changes, chlorites show little or no visible evidence of acid attack, with precise morphological detail of individual plates preserved in all samples following acid treatments. Chlorite dissolution, sensu stricto, did not occur as a result of acidization of the host sandstones. Acid-treated chlorides are likely to exits in a structurally weakened state that may make them susceptible to physical disintegration during fluid flow. Accordingly, fines migration may be a significant engineering problem associated with the acidization of chlorite-bearing sandstones. © 1993.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Samples from the Callide Coal Measures, Queensland, Australia, containing the minor maceral, micrinite, have been studied using optical and electron-optical techniques to determine the precise compositional and structural nature of micrinite when in association with vitrinite macerals. Emphasis has been placed on direct spatial correlation of optical and electron-optical data due to the fine grain size (<1μm) of micrinite and its relatively low abundance compared with other macerals in the Callide Basin coals. Precise elemental, morphological and structural data, including electron diffraction, provides unambiguous evidence for the presence of kaolinite in the component known as micrinite. Indeed, micrinite consists predominantly of fine-grained kaolinite (>90 per cent of the component) and, as such, should not be considered a maceral.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Partnerships between universities and public institutions such as this offer the beginning of a long term relationship to actively influence public policy, procedures and new ways to engage the many diverse communities to be integral in shaping the environments in which they live. It offers an opportunity to apply authentic positioning of research theories and build new methodologies for consulting, analysing and implementing innovation. SBC, as an established corporation offers a unique precinct to research and develop models with its different offers of tourism, leisure and neighbourhood. The Parklands and Little Stanley Street are well advanced in the goals however Grey Street, which connects the precinct to the greater surrounds, has been a complex issue that is now ready to be addressed. This project offers the ability to be of real worth at this critical time of development with the history of the past development combined with the desire for future visioning to be realised over the next 5 years. QUT has the unique opportunity to be part of this future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in the planning and delivery of radiotherapy treatments have resulted in improvements in the accuracy and precision with which therapeutic radiation can be administered. As the complexity of the treatments increases it becomes more difficult to predict the dose distribution in the patient accurately. Monte Carlo methods have the potential to improve the accuracy of the dose calculations and are increasingly being recognised as the “gold standard” for predicting dose deposition in the patient. In this study, software has been developed that enables the transfer of treatment plan information from the treatment planning system to a Monte Carlo dose calculation engine. A database of commissioned linear accelerator models (Elekta Precise and Varian 2100CD at various energies) has been developed using the EGSnrc/BEAMnrc Monte Carlo suite. Planned beam descriptions and CT images can be exported from the treatment planning system using the DICOM framework. The information in these files is combined with an appropriate linear accelerator model to allow the accurate calculation of the radiation field incident on a modelled patient geometry. The Monte Carlo dose calculation results are combined according to the monitor units specified in the exported plan. The result is a 3D dose distribution that could be used to verify treatment planning system calculations. The software, MCDTK (Monte Carlo Dicom ToolKit), has been developed in the Java programming language and produces BEAMnrc and DOSXYZnrc input files, ready for submission on a high-performance computing cluster. The code has been tested with the Eclipse (Varian Medical Systems), Oncentra MasterPlan (Nucletron B.V.) and Pinnacle3 (Philips Medical Systems) planning systems. In this study the software was validated against measurements in homogenous and heterogeneous phantoms. Monte Carlo models are commissioned through comparison with quality assurance measurements made using a large square field incident on a homogenous volume of water. This study aims to provide a valuable confirmation that Monte Carlo calculations match experimental measurements for complex fields and heterogeneous media.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The field of destination image has been widely discussed in the destination literature since the early 1970s (see Mayo, 1973). However the extent to which travel context impacts on an individual’s destination image evaluation, and therefore destination choice, has received scant attention (Hu & Ritchie, 1993). This study, utilising expectancy-value theory, sought to elicit salient destination attributes from consumers across two travel contexts: short-break holidays and longer getaways. Using the Repertory Test technique, attributes elicited as being salient for short-break holidays were consistent with those elicited for longer getaways. While this study was limited to Brisbane’s near-home destinations, the results will be of interest to destination marketers and researchers interested in the challenge of positioning a destination in diverse markets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to provide a new type of entry mode decision-making model for construction enterprises involved in international business. Design/methodology/approach – A hybrid method combining analytic hierarchy process (AHP) with preference ranking organization method for enrichment evaluations (PROMETHEE) is used to aid entry mode decisions. The AHP is used to decompose the entry mode problem into several dimensions and determine the weight of each criterion. In addition, PROMETHEE method is used to rank candidate entry modes and carry out sensitivity analyses. Findings – The proposed decision-making method is demonstrated to be a suitable approach to resolve the entry mode selection decision problem. Practical implications – The research provides practitioners with a more systematic decision framework and a more precise decision method. Originality/value – The paper sheds light on the further development of entry strategies for international construction markets. It not only introduces a new decision-making model for entry mode decision making, but also provides a conceptual framework with five determinants for a construction company entry mode selection based on the unique properties of the construction industry.