920 resultados para Laws of thermodynamics
Resumo:
This paper describes the formalization and application of a methodology to evaluate the safety benefit of countermeasures in the face of uncertainty. To illustrate the methodology, 18 countermeasures for improving safety of at grade railroad crossings (AGRXs) in the Republic of Korea are considered. Akin to “stated preference” methods in travel survey research, the methodology applies random selection and laws of large numbers to derive accident modification factor (AMF) densities from expert opinions. In a full Bayesian analysis framework, the collective opinions in the form of AMF densities (data likelihood) are combined with prior knowledge (AMF density priors) for the 18 countermeasures to obtain ‘best’ estimates of AMFs (AMF posterior credible intervals). The countermeasures are then compared and recommended based on the largest safety returns with minimum risk (uncertainty). To the author's knowledge the complete methodology is new and has not previously been applied or reported in the literature. The results demonstrate that the methodology is able to discern anticipated safety benefit differences across candidate countermeasures. For the 18 at grade railroad crossings considered in this analysis, it was found that the top three performing countermeasures for reducing crashes are in-vehicle warning systems, obstacle detection systems, and constant warning time systems.
Resumo:
The recent successful pregnancy of Thomas Beatie, a transgender FTM, billed by the various media as ‘the pregnant man’, has stirred up considerably diverse public opinion and debate, some supportive and indicative of changing and progressive ideas around sex, gender and sexuality; others condemnatory in their claims that Beatie’s pregnancy is an affront to the laws of Nature and/or God. Desired or derided, the pregnant male body contests the terrain of reproductive embodiment and the orthodoxy of Western systems of gender categorization. This chapter analyses a selection of media and internet responses to the case of the pregnant man, arguing that most disturbing of all it seems, is the body in-between (Kristeva 1982, p.4), the one that visibly defies socially obdurate gender oppositions of male and female, feminine and masculine in its insistence on being, to borrow from Homi Bhabha, a ‘third space of enunciation.’ Banana Yoshimoto’s novella Kitchen, also contests gender boundaries in its characterisation of Eriko, a transgendered male to female, a father, then a mother. In this narrative the in-between, the ambiguous, is not reviled but rather celebrated as a ‘horizon of possibility’ (Halperin, qtd in Jagose 1996 http://www.australianhumanitiesreview.org/archive/Issue-Dec- 1996/jagose.html).
Resumo:
In conveyancing of all types, it is very common that a contract will only be formed after often lengthy negotiations which may involve a counter-offer or multiple counter-offers. At common law, the laws of contract that govern these arrangements are well known and well understood. However, the legislative overlay imposed by the requirements of the Property Agents and Motor Dealers Act 2000 (Qld) (‘PAMDA’) can create difficulties as illustrated by the result in Rice v Ray [2009] QDC 275.
Resumo:
Natural convection flow in a two-dimensional fluid saturated porous enclosure with localized heating from below, symmetrical cooling from the sides and the top and rest of the bottom walls are insulated, has been investigated numerically. Darcy’s law for porous media along with the energy equation based on the 1st law of thermodynamics has been considered. Implicit finite volume method with TDMA solver is used to solve the governing equations. Localized heating is simulated by a centrally located isothermal heat source on the bottom wall, and four different values of the dimensionless heat source length, 1/5, 2/5, 3/5 and 4/5 are considered. The effect of heat source length and the Rayleigh number on streamlines and isotherms are presented, as well as the variation of the local rate of heat transfer in terms of the local Nusselt number from the heated wall. Finally, the average Nusselt number at the heated part of the bottom wall has been shown against Rayleigh number for the non-dimensional heat source length.
Resumo:
The final shape of the "Internet of Things" ubiquitous computing promises relies on a cybernetic system of inputs (in the form of sensory information), computation or decision making (based on the prefiguration of rules, contexts, and user-generated or defined metadata), and outputs (associated action from ubiquitous computing devices). My interest in this paper lies in the computational intelligences that suture these positions together, and how positioning these intelligences as autonomous agents extends the dialogue between human-users and ubiquitous computing technology. Drawing specifically on the scenarios surrounding the employment of ubiquitous computing within aged care, I argue that agency is something that cannot be traded without serious consideration of the associated ethics.
Resumo:
The international legal regime on shipbreaking is in its formative years. At the international level, the shipbreaking industry is partially governed by the Basel Convention on the Control of Transboundary Movements of Hazardous Wastes and their Disposal. However, how far this convention will be applicable for all aspects of transboundary movement of end-of-life ships is still, at least in the view of some scholars, a debatable issue. Against this backdrop, the International Maritime Organisation (IMO) has adopted a new, legally binding convention for shipbreaking. There is a rising voice from the developing countries that the convention is likely to impose more obligations on recycling facilities in the developing countries than on shipowners from rich nations. This may be identified as a clear derogation from the globally recognized international environmental law principle of common but differentiated treatment. This article will examine in detail major international conventions regulating transboundary movement and environmentally sound disposal of obsolete ships, as well as the corresponding laws of Bangladesh for implementing these conventions in the domestic arena. Moreover this article will examine in detail the recently adopted IMO Ship Recycling Convention.
Resumo:
"Voluntary bankruptcy occurs where a debtor commences the process of bankruptcy against himself or herself. One of the policies underlying the modern law of bankruptcy is that a person in a hopeless financial position should be given an opportunity to start again without the burden of previous debts.1 This has long been recognised by the courts; for example as Kennedy J. stated in relation to the position in the UK..."
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.