999 resultados para covers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reviews the main studies on transit users’ route choice in thecontext of transit assignment. The studies are categorized into three groups: static transit assignment, within-day dynamic transit assignment, and emerging approaches. The motivations and behavioural assumptions of these approaches are re-examined. The first group includes shortest-path heuristics in all-or-nothing assignment, random utility maximization route-choice models in stochastic assignment, and user equilibrium based assignment. The second group covers within-day dynamics in transit users’ route choice, transit network formulations, and dynamic transit assignment. The third group introduces the emerging studies on behavioural complexities, day-to-day dynamics, and real-time dynamics in transit users’ route choice. Future research directions are also discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

These cards are designed as a resource for implementing participatory action research (PAR) in social programs. Each card covers one of the five key stages of PAR as outlined in the manual 'On PAR- Using participatory Action Research to Improve Early Intervention' (Crane and O'Regan 2010).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is more that 20 years since the “Social Control of the Drink Driver” edited by Laurence, Snortum and Zimring (1988) were published. It was, and remains a major examination of the issue involving 17 scientists from all relevant disciplines and policy centres and represents the current practice and experience at the time. While much of, but by no means all, the content is centred on the North American experience the scholarship and range of research data explored through the investigative lens of lawyers, pharmacologists, psychologists, sociologists, criminologists and economists covers all the major issues being examined in Europe, and Australia at the time. More importantly, it presents the policy aspirations and goals of nine countries and includes a comparison of deterrence and the legal context in six countries; emerging technologies for control and the potential contributions of education and rehabilitation. The experience of promoting evidence based policies and practices are generally experienced in all countries as both laborious and painfully slow. However, this ICADTS meeting in Norway provides an opportunity to challenge these feelings by re-examining the current situation compared with that documented over 20yrs ago. This presentation will undertake a reality check on just what we have achieved within that time and try to attribute success and failure towards recommendations for our future endeavours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article investigates virtual reality representations of performance in London’s late sixteenth-century Rose Theatre, a venue that, by means of current technology, can once again challenge perceptions of space, performance, and memory. The VR model of The Rose represents a virtual recreation of this venue in as much detail as possible and attempts to recover graphic demonstrations of the trace memories of the performance modes of the day. The VR model is based on accurate archeological and theatre historical records and is easy to navigate. The introduction of human figures onto The Rose’s stage via motion capture allows us to explore the relationships between space, actor and environment. The combination of venue and actors facilitates a new way of thinking about how the work of early modern playwrights can be stored and recalled. This virtual theatre is thus activated to intersect productively with contemporary studies in performance; as such, our paper provides a perspective on and embodiment of the relation between technology, memory and experience. It is, at its simplest, a useful archiving project for theatrical history, but it is directly relevant to contemporary performance practice as well. Further, it reflects upon how technology and ‘re-enactments’ of sorts mediate the way in which knowledge and experience are transferred, and even what may be considered ‘knowledge.’ Our work provides opportunities to begin addressing what such intermedial confrontations might produce for ‘remembering, experiencing, thinking and imagining.’ We contend that these confrontations will enhance live theatre performance rather than impeding or disrupting contemporary performance practice. Our ‘paper’ is in the form of a video which covers the intellectual contribution while also permitting a demonstration of the interventions we are discussing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Buildings and infrastructure represent principal assets of any national economy as well as prime sources of environmental degradation. Making them more sustainable represents a key challenge for the construction, planning and design industries and governments at all levels; and the rapid urbanisation of the 21st century has turned this into a global challenge. This book embodies the results of a major research programme by members of the Australia Co-operative Research Centre for Construction Innovation and its global partners, presented for an international audience of construction researchers, senior professionals and advanced students. It covers four themes, applied to regeneration as well as to new build, and within the overall theme of Innovation: Sustainable Materials and Manufactures, focusing on building material products, their manufacture and assembly – and the reduction of their ecological ‘fingerprints’, the extension of their service lives, and their re-use and recyclability. It also explores the prospects for applying the principles of the assembly line. Virtual Design, Construction and Management, viewed as increasing sustainable development through automation, enhanced collaboration (such as virtual design teams), real time BL performance assessment during design, simulation of the construction process, life-cycle management of project information (zero information loss) risk minimisation, and increased potential for innovation and value adding. Integrating Design, Construction and Facility Management over the Project Life Cycle, by converging ICT, design science engineering and sustainability science. Integration across spatial scales, enabling building–infrastructure synergies (such as water and energy efficiency). Convergences between IT and design and operational processes are also viewed as a key platform increased sustainability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using GIS to evaluate travel behaviour is an important technique to increase our understanding of the relationship between accessibility and transport demand. In this paper, the activity space concept was used to identify the nature of participation in activities (or lack of it) amongst a group of students using a 2 day travel-activity diary. Three different indicators such as the number of unique locations visited, average daily distance travelled, and average daily activity duration were used to measure the size of activity spaces. These indicators reflect levels of accessibility, personal mobility, and the extent of participation respectively. Multiple regression analyses were used to assess the impacts of students socio-economic status and the spatial characteristics of home location. Although no differences were found in the levels of accessibility and the extent of participation measures, home location with respect to a demand responsive transport (DRT) service was found to be the most important determinant of their mobility patterns. Despite being able to travel longer distances, students who live outside of the DRT service area were found to be temporally excluded from some opportunities. Student activity spaces were also visualised within a GIS environment and a spatial analysis was conducted to underpin the evaluation of the performance of the DRT. This approach was also used to identify the activity spaces of individuals that are geographically excluded from the service. Evaluation of these results indicated that although the service currently covers areas of high demand, 90% of the activity spaces remained un-served by the DRT service. Using this data six new routes were designed to meet the coverage goal of public transport based on a measure of network impedance based on inverse activity density. Following assessment of public transport service coverage, the study was extended using a Spatial Multi Criteria Evaluation (SMCE) technique to assess the effect of service provision on patronage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The International Road Assessment Program (iRAP) is a not-for-profit organisation that works in partnership with governments and non-government organisations in all parts of the world to make roads safe. The iRAP Malaysia pilot study on 3700km of road identified the potential to prevent 31,800 deaths and serious injuries over the next 20 years from proven engineering improvements. To help ensure the iRAP data and results are available to planners and engineers, iRAP, together with staff from the Centre for Accident Research and Road Safety – Queensland (CARRS-Q) and the Malaysian Institute of Road Safety Research (MIROS), developed a five-day iRAP training course that covers the background, theory and practical application of iRAP protocols, with a special focus on Malaysian case studies. Funding was provided by a competitive grant from the Australia-Malaysia Institute.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In asset intensive industries such as mining, oil & gas, utilities etc. most of the capital expenditure happens on acquiring engineering assets. Process of acquiring assets is called as “Procurement” or “Acquisition”. An asset procurement decision should be taken in consideration with the installation, commissioning, operational, maintenance and disposal needs of an asset or spare. However, such cross-functional collaboration and communication does not appear to happen between engineering, maintenance, warehousing and procurement functions in many asset intensive industries. Acquisition planning and execution are two distinct parts of asset acquisition process. Acquisition planning or procurement planning is responsible for determining exactly what is required to be purchased. It is important that an asset acquisition decision is the result of cross-functional decision making process. An acquisition decision leads to a formal purchase order. Most costly asset decisions occur even before they are acquired. Therefore, acquisition decision should be an outcome of an integrated planning & decision making process. Asset intensive organizations both, Government and non Government in Australia spent AUD 102.5 Billion on asset acquisition in year 2008-09. There is widespread evidence of many assets and spare not being used or utilized and in the end are written off. This clearly shows that many organizations end up buying assets or spares which were not required or non-conforming to the needs of user functions. It is due the fact that strategic and software driven procurement process do not consider all the requirements from various functions within the organization which contribute to the operation and maintenance of the asset over its life cycle. There is a lot of research done on how to implement an effective procurement process. There are numerous software solutions available for executing a procurement process. However, not much research is done on how to arrive at a cross functional procurement planning process. It is also important to link procurement planning process to procurement execution process. This research will discuss ““Acquisition Engineering Model” (AEM) framework, which aims at assisting acquisition decision making based on various criteria to satisfy cross-functional organizational requirements. Acquisition Engineering Model (AEM) will consider inputs from corporate asset management strategy, production management, maintenance management, warehousing, finance and HSE. Therefore, it is essential that the multi-criteria driven acquisition planning process is carried out and its output is fed to the asset acquisition (procurement execution) process. An effective procurement decision making framework to perform acquisition planning which considers various functional criteria will be discussed in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines one of the changes implemented in the Corporations Amendment (Insolvency) Act 2007 (Cth) . It is argued that the insertion of s 444DA raises some matters that go to the nature of the insolvency process generally and the operation of Pt 5.3A in a particular. The position of employees in insolvency is a matter that is the subject of much comment from a policy perspective. This article does not cover that debate but provides some initial explanation of the need to protect employees. The second part of the article covers the particular background to the voluntary administration system as far as employee rights are concerned as well as the arguments put forward by the government to justify the change in the legislation which inserted s 444DA . It suggests that there was little evidence provided for the need to protect employee priority rights in this particular way. An alternative explanation is given for the change adopted by the government. The third part of the article suggests that the manner in which the legislation seeks to better protect employee creditors is somewhat clumsy in its operation. It raises a number of questions about how the legislation may operate and argues that given the stated aims, some alteration to it would improve its effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bus Rapid Transit (BRT), because of its operational flexibility and simplicity, is rapidly gaining popularity with urban designers and transit planners. Earlier BRTs were bus shared lane or bus only lane, which share the roadway with general and other forms of traffic. In recent time, more sophisticated designs of BRT have emerged, such as busway, which has separate carriageway for buses and provides very high physical separation of buses from general traffic. Line capacities of a busway are predominately dependent on bus capacity of its stations. Despite new developments in BRT designs, the methodology of capacity analysis is still based on traditional principles of kerbside bus stop on bus only lane operations. Consequently, the tradition methodology lacks accounting for various dimensions of busway station operation, such as passenger crowd, passenger walking and bus lost time along the long busway station platform. This research has developed a purpose made bus capacity analysis methodology for busway station analysis. Extensive observations of kerbside bus stops and busway stations in Brisbane, Australia were made and differences in their operation were studied. A large scale data collection was conducted using the video recording technique at the Mater Hill Busway Station on the South East Busway in Brisbane. This research identified new parameters concerning busway station operation, and through intricate analysis identified the elements and processes which influence the bus dwell time at a busway station platform. A new variable, Bus lost time, was defined and its quantitative descriptions were established. Based on these finding and analysis, a busway station platform bus capacity methodology was developed, comprising of new models for busway station lost time, busway station dwell time, busway station loading area bus capacity, and busway station platform bus capacity. The new methodology not only accounts for passenger boarding and alighting, but also covers platform crowd and bus lost time in station platform bus capacity estimation. The applicability of this methodology was shown through demonstrative examples. Additionally, these examples illustrated the significance of the bus lost time variable in determining station capacities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The practice of robotics and computer vision each involve the application of computational algorithms to data. The research community has developed a very large body of algorithms but for a newcomer to the field this can be quite daunting. For more than 10 years the author has maintained two open-source MATLAB® Toolboxes, one for robotics and one for vision. They provide implementations of many important algorithms and allow users to work with real problems, not just trivial examples. This new book makes the fundamental algorithms of robotics, vision and control accessible to all. It weaves together theory, algorithms and examples in a narrative that covers robotics and computer vision separately and together. Using the latest versions of the Toolboxes the author shows how complex problems can be decomposed and solved using just a few simple lines of code. The topics covered are guided by real problems observed by the author over many years as a practitioner of both robotics and computer vision. It is written in a light but informative style, it is easy to read and absorb, and includes over 1000 MATLAB® and Simulink® examples and figures. The book is a real walk through the fundamentals of mobile robots, navigation, localization, arm-robot kinematics, dynamics and joint level control, then camera models, image processing, feature extraction and multi-view geometry, and finally bringing it all together with an extensive discussion of visual servo systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we seek to expand the use of direct methods in real-time applications by proposing a vision-based strategy for pose estimation of aerial vehicles. The vast majority of approaches make use of features to estimate motion. Conversely, the strategy we propose is based on a MR (Multi- Resolution) implementation of an image registration technique (Inverse Compositional Image Alignment ICIA) using direct methods. An on-board camera in a downwards-looking configuration, and the assumption of planar scenes, are the bases of the algorithm. The motion between frames (rotation and translation) is recovered by decomposing the frame-to-frame homography obtained by the ICIA algorithm applied to a patch that covers around the 80% of the image. When the visual estimation is required (e.g. GPS drop-out), this motion is integrated with the previous known estimation of the vehicles’ state, obtained from the on-board sensors (GPS/IMU), and the subsequent estimations are based only on the vision-based motion estimations. The proposed strategy is tested with real flight data in representative stages of a flight: cruise, landing, and take-off, being two of those stages considered critical: take-off and landing. The performance of the pose estimation strategy is analyzed by comparing it with the GPS/IMU estimations. Results show correlation between the visual estimation obtained with the MR-ICIA and the GPS/IMU data, that demonstrate that the visual estimation can be used to provide a good approximation of the vehicle’s state when it is required (e.g. GPS drop-outs). In terms of performance, the proposed strategy is able to maintain an estimation of the vehicle’s state for more than one minute, at real-time frame rates based, only on visual information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stephen Page talking with Cheryl Stock Stephen Page is one of the most significant dance artists working in Australia today, unique in his ability to forge and sustain a company of Indigenous artists through his seminal leadership of Bangarra Dance Theatre, which celebrated its 20 year anniversary in 2009. Together with the many artists who have contributed to the Bangarra vision, Stephen has created a distinctive contemporary Indigenous dance style and approach, celebrated for the stories it tells of the Aboriginal and Torres Strait Islander experience. Fusing the traditional with the contemporary through a connection to the spirit of the land and its people, Stephen has inspired and influenced a generation of Aboriginal and Torres Strait Islander dance and theatre artists as a choreographer, director and mentor. His down to earth humour, his passion and his sensitivity draw us as audience, Indigenous and non-Indigenous alike, to his theatrical stories of place and spirit – both ancient and modern – in ways that simultaneously transcend and reaffirm the particular cultural experience which informs them. This conversation covers the early years of growing up with his 'urban clan', discovering dance and politics and his spiritual awakening at Yirrkala. Stephen then describes moving in and out of different realities as a member of Sydney Dance Company whilst simultaneously exploring his Indigenous dance voice, the transition from dancer to choreographer, creating the Bangarra identity and the intercultural experiment of 'Rites' with the Australian Ballet. The last section looks at his various roles as an artistic director and nurturing the next generation of Indigenous artists.