922 resultados para University Authors
Resumo:
Unsteady natural convection inside a triangular cavity has been studied in this study. The cavity is filled with a saturated porous medium with non-isothermal left inclined wall while the bottom surface is isothermally heated and the right inclined surface is isothermally cold. An internal heat generation is also considered which is dependent of the fluid temperature. The governing equations are solved numerically by finite element method. The Prandtl number of the fluid is considered as 0.7 (air) while the aspect ratio and the Rayleigh number are considered as 0.5 and 105 respectively. The effect of the porosity of the medium and heat generation on the fluid flow and heat transfer have been presented as a form of streamlines and isotherms. The rate of heat transfer through three surfaces of the enclosure is also presented.
Resumo:
Natural convection in a triangular enclosure subject to non-uniformly cooling at the inclined surfaces and uniformly heating at the base is investigated numerically. The numerical simulations of the unsteady flows over a range of Rayleigh numbers and aspect ratios are carried out using Finite Volume Method. Since the upper surface is cooled and the bottom surface is heated, the air flow in the enclosure is potentially unstable to Rayleigh Benard instability. It is revealed that the transient flow development in the enclosure can be classified into three distinct stages; an early stage, a transitional stage and a steady stage. It is also found that the flow inside the enclosure strongly depends on the governing parameters, Rayleigh number and aspect ratio. The asymmetric behaviour of the flow about the geometric centre line is discussed in detailed. The heat transfer through the roof and the ceiling as a form of Nusselt number is also reported in this study.
Resumo:
Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.
Resumo:
Web 2.0 technology and concepts are being used increasingly by organisations to enhance knowledge, efficiency, engagement and reputation. Understanding the concepts of Web 2.0, its characteristics, and how the technology and concepts can be adopted, is essential to successfully reap the potential benefits. In fact, there is a debate about using the Web 2.0 idiom to refer to the concept behind it; however, this term is widely used in literature as well as in industry. In this paper, the definition of Web 2.0 technology, its characteristics and the attributes, will be presented. In addition, the adoption of such technology is further explored through the presentation of two separate case examples of Web 2.0 being used: to enhance an enterprise; and to enhance university teaching. The similarities between these implementations are identified and discussed, including how the findings point to generic principles of adoption.
Resumo:
In recent years, enterprise architecture (EA) has captured a growing attention as a means to systematically consolidate and interrelate diverse business and IT artefacts in order to provide holistic decision support. The recent popularity of a service-orientation has added “service “and related constructs as a new element that requires consideration within an Enterprise Architecture. Since the emergence of the Service-Oriented Architecture (SOA), many attempts have been made to incorporate SOA artefacts in existing EA frameworks. Yet, the approaches taken to achieve this goal differ substantially for the most commonly used EA frameworks to date. SOA in the context of enterprise architecture is one of the future research challenges. Several authors argue that further research is needed in order to understand how SOA impacts prior enterprise architecture frameworks. This study explores SOA integration within EA, identifies SOA integration approaches within EA and identifies factors that impact SOA integration within Enterprise Architecture.
Resumo:
Failing injectors are one of the most common faults in diesel engines. The severity of these faults could have serious effects on diesel engine operations such as engine misfire, knocking, insufficient power output or even cause a complete engine breakdown. It is thus essential to prevent such faults from occurring by monitoring the condition of these injectors. In this paper, the authors present the results of an experimental investigation on identifying the signal characteristics of a simulated incipient injector fault in a diesel engine using both in-cylinder pressure and acoustic emission (AE) techniques. A time waveform event driven synchronous averaging technique was used to minimize or eliminate the effect of engine speed variation and amplitude fluctuation. It was found that AE is an effective method to detect the simulated injector fault in both time (crank angle) and frequency (order) domains. It was also shown that the time domain in-cylinder pressure signal is a poor indicator for condition monitoring and diagnosis of the simulated injector fault due to the small effect of the simulated fault on the engine combustion process. Nevertheless, good correlations between the simulated injector fault and the lower order components of the enveloped in-cylinder pressure spectrum were found at various engine loading conditions.
Resumo:
This is a practice-led project consisting of a historical novel Abduction and related exegesis. The novel is a third person intimate narrative set in the mid-nineteenth century and is based on actual events and persons caught up in, or furthering, the mass dispossession of small farmers in Scotland known as the ‘Clearances’. The narrative focuses on the situation in the Outer Hebrides and northern Scotland. It is based on documented facts leading up to a controversial trial in 1850 that arose because a twenty year old woman of the period (the central protagonist, Jess Mackenzie) eloped with a young farmer to escape her parent’s pressure to marry a rival suitor, himself a powerful lawyer and ‘factor’ at the centre of many of the Clearances. The young woman’s independent ideas were ahead of her time, and the decisions she made under great pressure were crucial in some dramatic events that unfolded in Scotland and later in the colony of Victoria, to which she and her new husband emigrated soon after the trial. The exegesis is composed of two unequal parts. It briefly considers the development of the literary historical fiction genre in the nineteenth century with Walter Scott in particular, a genre found useful in representing women’s issues of the Victorian era by Victorian and contemporary authors. The exegesis also briefly considers the appropriateness of the fiction genre (as opposed to creative nonfiction) in creating the lived experience in a fact-based work. The major part of the exegesis is a detailed, reflective analysis of the problem-solving process involved in writing the novel, structured by reference to Kate Grenville’s Searching for the Secret River – a work of metawriting that explains her creative process in researching and writing historical fiction based on fact.
Resumo:
goDesign Travelling Workshop Program for Regional Secondary Students was an initiative of Queensland University of Technology (QUT) and the Design Institute of Australia (DIA) Queensland Branch, which aligned with the DIA unleashed: Queensland design on tour 2010 Exhibition. It was designed be delivered by university design academics in state secondary schools in Chinchilla, Mt Isa, Quilpie, Emerald, Gladstone and Bundaberg between February and September 2010, to approximately 95 secondary students and 24 teachers from the subject areas of visual art, graphics and industrial technology and design. A talk by a visiting design practitioner whose work was displayed in the exhibition, also features in the final day of the program in each town, and student work from the workshop was displayed in the exhibition alongside the professional design work. The three-day workshop is a design immersion program for regional Queensland Secondary Schools, which responds to specific actions outlined in the Queensland Government Design Strategy 2020 to ‘Build Design Knowledge and Learning’ and ‘Foster a Design Culture’. Underpinned by a place-based approach and the integration of Dr Charles Burnette’s IDESIGN teaching model, the program gives students and teachers the opportunity to explore, analyse and reimagine their local town through a series of scaffolded problem solving activities around the theme of ‘place’. The program allows students to gain hands-on experience designing graphics, products, interior spaces and architecture to assist their local community, with the support of design professionals. Students work individually and in groups on real design problems learning sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. The program was designed to facilitate an understanding of the value of design thinking and its importance to regional communities, to give students more information about various design disciplines as career options, and provide a professional development opportunity for teachers. Advisory assistance for the program was gained through Kelvin Grove State College, Queensland Studies Authority and QMI/Manufacturing Skills Queensland Manager, Manufacturing & Engineering Gateway Schools Project.
Resumo:
This report is an update of an earlier version produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. The report provides an introduction to our analyses of extant secondary data with respect to violent acts and incidents relating to males living in rural settings in Australia using data which were available in public data bases at the time of production. It clarifies important aspects of our overall approach primarily by concentrating on three elements that required early scoping and resolution.
Resumo:
This report is an update of an earlier one produced in September 2009 (see Carrington et al. 2009) which remains as an ePrint through the project’s home page. The report focuses on our examination of extant data which have been sourced with respect to self-harm and suicide among males living in regional and remote Australia and which were available in public data bases at production time. Moreover, specific areas of concern regarding elevated rates of suicide for rural males and data anomalies which emerged during our examination of these data are discussed.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. This report focuses on our examination of extant data which have been sourced with respect to intentional violence perpetrated or experienced by males living in regional and remote Australia . and which were available in public data bases at production. The nature of intentional violent acts can be physical, sexual or psychological or involve deprivation or neglect.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. This report focuses on our examination of extant data which have been sourced with respect to unintentional serious and violent harm, including injuries, to males living in regional and remote Australia . and which were available in public data bases at production. Such harm typically might be caused by, for example, transport accidents, occupational exposures and hazards, burns and so on. Thus unintentional violent harm can cause physical trauma the consequences of which can lead to chronic conditions including psychological harm or substance abuse.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. The report focus on our examination of extant data which have been sourced with respect to personally and socially risky behaviour associated with males living in regional and remote Australia and which were available in public data bases at production.