931 resultados para Renormalization schemes
Resumo:
The detached housing scheme is a unique and exclusive segment of the residential property market in Malaysia. Generally, the product is expensive and for many Malaysians who can afford them, owning a detached house is a once in a lifetime opportunity. In spite of this, most of the owners failed to fully comprehend the specific need of this type of housing scheme, increasing the risk of it being a problematic undertaking. Unlike other types of pre-designed "mass housing" schemes, the detached housing scheme may be built specifically to cater the needs and demands of its owner. Therefore, owner participation during critical development stages is vital to guarantee the success of the development as a whole. In addition, due to its unique design the house would have to individually comply with the requirements and regulations of relevant authorities. Failure by the owner to recognise this will result in delays, penalties, disputes and ultimately cost overruns. These circumstances highlight the need for a research to guide the owner through participation during the critical development stages of a detached house. Therefore, this research aims to develop a guideline to improve owner participation for a successful detached house development in Malaysia. To achieve the aim, questionnaire surveys and semi-structured interviews were employed to collect the detached house owners' and consultants' & contractors' responses through their experiences in developing detached houses in Malaysia. Stratified and random sampling were utilised to gather information from both parties to represent Malaysian detached house participants. The questionnaire responses were analysed through the application of quantitative analysis such as descriptive analysis, factor analysis and structural equation modelling which were substantiated through qualitative analysis procedure such as content analysis. This research had identified that in order to produce a successful outcome detached house owners are required to participate during critical stages of the development. In the planning stage, the owner needs to provide proper specific input to the consultant regarding his/her expectations of the cost for the entire development, its detailed specification and general idea of the internal and external design of the detached house and its compound. In the contracting stage, the owner must make the appropriate choice of selecting the right contractor for the job. This decision may be taken after recommendations from the consultants or from the owner's personal contacts or experiences but it is not recommended for the owner to select a contractor primarily on the basis of the lowest bid. In the completion stage, the owner may need to attend a number of important site meetings to ensure that the progress of the works is according to what had been planned and the completion date is achievable. By having the owners undertake an active role during critical stages of the development, not only the quality and delivery of the development improved but also there is an increase in satisfaction to the owners themselves.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
Commuting in the mining industry -Background -The problem -Journey management -The structure of the legislative framework Legislation and Regulation -Workplace safety in Queensland mining -Risk management -Mining legislation and journey management -Commuting and employee responsibilities -Queensland Workers’ Compensation Scheme Industry standards -Industry standards and journey management Regulated and organisational policy documents -Policy documents and journey management Observations & Conclusions
Resumo:
The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a kernel function. The forecasts that are obtained using this method are accurate and therefore potentially useful to electricity retailers in terms of risk management.
Resumo:
Trauma, in the form of pressure and/or friction from footwear, is a common cause of foot ulceration in people with diabetes. These practical recommendations regarding the provision of footwear for people with diabetes were agreed upon following review of existing position statements and clinical guidelines. The aim of this process was not to re-invent existing guidelines but to provide practical guidance for health professionals on how they can best deliver these recommendations within the Australian health system. Where information was lacking or inconsistent, a consensus was reached following discussion by all authors. Appropriately prescribed footwear, used alone or in conjunction with custom-made foot orthoses, can reduce pedal pressures and reduce the risk of foot ulceration. It is important for all health professionals involved in the care of people with diabetes to both assess and make recommendations on the footwear needs of their clients or to refer to health professionals with such skills and knowledge. Individuals with more complex footwear needs (for example those who require custom-made medical grade footwear and orthoses) should be referred to health professionals with experience in the prescription of these modalities and who are able to provide appropriate and timely follow-up. Where financial disadvantage is a barrier to individuals acquiring appropriate footwear, health care professionals should be aware of state and territory based equipment funding schemes that can provide financial assistance. Aboriginal and Torres Strait Islanders and people living in rural and remote areas are likely to have limited access to a broad range of footwear. Provision of appropriate footwear to people with diabetes in these communities needs be addressed as part of a comprehensive national strategy to reduce the burden of diabetes and its complications on the health system.
Resumo:
Microgrids (MG) enable the integration of low capacity renewable energy resources with distribution systems. A recently proposed protection scheme for MGs utilising undervoltage, High Impedance Fault (HIF) detection, directional protection modules, and communication links significantly reduces the fault clearing time compared to previous schemes. In this paper, the effect of replacing undervoltage protection with differential protection in a scheme that also contains HIF and directional protection modules is studied. The MG model used in this study includes a diesel, wind, and two photovoltaic (PV) microsources. The alternative protection schemes are evaluated by simulation. It is found that the protection scheme consisting of differential, HIF detection, and directional protection modules is more effective compared to the alternative in protecting the MG from some fault conditions such as the phase-A-to-ground, phase-B-to-C, and phase-B-to-C-to-ground.
Resumo:
Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.
Resumo:
Integration of small-scale electricity generators, known as Distributed Generation (DG), into the distribution networks has become increasingly popular at the present. This tendency together with the falling price of synchronous-type generator has potential to give the DG a better chance in participating in the voltage regulation process together with other devices already available in the system. The voltage control issue turns out to be a very challenging problem for the distribution engineers since existing control coordination schemes would need to be reconsidered to take into account the DG operation. In this paper, we propose a control coordination technique, which is able to utilize the ability of the DG as a voltage regulator, and at the same time minimizes interaction with other active devices, such as On-load Tap Changing Transformer (OLTC) and voltage regulator. The technique has been developed based on the concept of control zone, Line Drop Compensation (LDC), as well as the choice of controller's parameters. Simulations carried out on an Australian system show that the technique is suitable and flexible for any system with multiple regulating devices including DG.
Resumo:
The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.
Resumo:
Increasing penetration of photovoltaic (PV) as well as increasing peak load demand has resulted in poor voltage profile for some residential distribution networks. This paper proposes coordinated use of PV and Battery Energy Storage (BES) to address voltage rise and/or dip problems. The reactive capability of PV inverter combined with droop based BES system is evaluated for rural and urban scenarios (having different R/X ratios). Results show that reactive compensation from PV inverters alone is sufficient to maintain acceptable voltage profile in an urban scenario (low resistance feeder), whereas, coordinated PV and BES support is required for the rural scenario (high resistance feeder). Constant as well as variable droop based BES schemes are analyzed. The required BES sizing and associated cost to maintain the acceptable voltage profile under both schemes is presented. Uncertainties in PV generation and load are considered, with probabilistic estimation of PV generation and randomness in load modeled to characterize the effective utilization of BES. Actual PV generation data and distribution system network data is used to verify the efficacy of the proposed method.
Resumo:
Currently, the GNSS computing modes are of two classes: network-based data processing and user receiver-based processing. A GNSS reference receiver station essentially contributes raw measurement data in either the RINEX file format or as real-time data streams in the RTCM format. Very little computation is carried out by the reference station. The existing network-based processing modes, regardless of whether they are executed in real-time or post-processed modes, are centralised or sequential. This paper describes a distributed GNSS computing framework that incorporates three GNSS modes: reference station-based, user receiver-based and network-based data processing. Raw data streams from each GNSS reference receiver station are processed in a distributed manner, i.e., either at the station itself or at a hosting data server/processor, to generate station-based solutions, or reference receiver-specific parameters. These may include precise receiver clock, zenith tropospheric delay, differential code biases, ambiguity parameters, ionospheric delays, as well as line-of-sight information such as azimuth and elevation angles. Covariance information for estimated parameters may also be optionally provided. In such a mode the nearby precise point positioning (PPP) or real-time kinematic (RTK) users can directly use the corrections from all or some of the stations for real-time precise positioning via a data server. At the user receiver, PPP and RTK techniques are unified under the same observation models, and the distinction is how the user receiver software deals with corrections from the reference station solutions and the ambiguity estimation in the observation equations. Numerical tests demonstrate good convergence behaviour for differential code bias and ambiguity estimates derived individually with single reference stations. With station-based solutions from three reference stations within distances of 22–103 km the user receiver positioning results, with various schemes, show an accuracy improvement of the proposed station-augmented PPP and ambiguity-fixed PPP solutions with respect to the standard float PPP solutions without station augmentation and ambiguity resolutions. Overall, the proposed reference station-based GNSS computing mode can support PPP and RTK positioning services as a simpler alternative to the existing network-based RTK or regionally augmented PPP systems.
Resumo:
Purpose The purpose of this paper is to determine whether greenhouse gas (GHG) tradeable instruments will be classified as financial products within the scope of the World Trade Organization (WTO) law and to explore the implications of this finding. Design/methodology/approach This purpose is achieved through examination of the units of the Australian Carbon Pricing Mechanism (CPM), namely eligible emissions units. These units are analysed through the lens of the definition of financial products provided in the General Agreement for Trade in Services (the GATS). Findings This paper finds that eligible emissions units will be classified as financial instruments, and therefore the provisions that govern their trade will be regulated by the GATS. Considering this, this paper explores the limitations that are introduced by the Australian legislation on the trade of eligible emissions units. Research limitations/implications This paper is limited in its analysis to the Australian CPM. In order to draw conclusions on the issues raised by this analysis it is necessary to consider the WTO requirements against an operating emissions trading scheme. The Australian CPM presents a contemporary model of an appropriate scheme. Originality/value The findings in this paper are crucial in a GHG constrained society. This is because emissions trading schemes are becoming popular measures for pricing GHG emissions, and for this reason the units that are traded and surrendered for emissions liabilities must be classified appropriately on a global scale. Failing to do this could result in differential treatment that may be contrary to the intentions of important global agreements, such as the WTO covered agreements.
Resumo:
This research identifies roadway, traffic, and environmental factors that influence the injury severity of road traffic crashes in Dhaka. Dhaka provides a rather unusual driving risk environment to study, since virtually anyone can obtain a drivers’ license and very little traffic enforcement and fines are given when drivers violate traffic rules. To examine this city with presumed heightened crash severity risk, police reported crash data from 2007 to 2011 containing about 2714 road traffic crashes were collected. The injury severity of traffic crashes—recorded as either fatal, serious injury, or property damage only—were modeled using an ordered Probit model. Significant factors increasing the probability of fatal injuries include crashes along highways (65%), absence of a road divider (80%), crashes during night time (54%), and vehicle-pedestrian collisions (367%); whereas two-way traffic configuration (21%), and traffic police controlled schemes (41%) decrease the probability of fatalities. Both similarities and differences of the findings between crash risk in Dhaka and developed countries are discussed in policy relevant terms.
Resumo:
The numerical solution in one space dimension of advection--reaction--diffusion systems with nonlinear source terms may invoke a high computational cost when the presently available methods are used. Numerous examples of finite volume schemes with high order spatial discretisations together with various techniques for the approximation of the advection term can be found in the literature. Almost all such techniques result in a nonlinear system of equations as a consequence of the finite volume discretisation especially when there are nonlinear source terms in the associated partial differential equation models. This work introduces a new technique that avoids having such nonlinear systems of equations generated by the spatial discretisation process when nonlinear source terms in the model equations can be expanded in positive powers of the dependent function of interest. The basis of this method is a new linearisation technique for the temporal integration of the nonlinear source terms as a supplementation of a more typical finite volume method. The resulting linear system of equations is shown to be both accurate and significantly faster than methods that necessitate the use of solvers for nonlinear system of equations.