913 resultados para hard hats


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Volatile properties of particle emissions from four compressed natural gas (CNG) and four diesel buses were investigated under steady state and transient driving modes on a chassis dynamometer. The exhaust was diluted utilising a full-flow continuous volume sampling system and passed through a thermodenuder at controlled temperature. Particle number concentration and size distribution were measured with a condensation particle counter and a scanning mobility particle sizer, respectively. We show that, while almost all the particles emitted by the CNG buses were in the nanoparticle size range, at least 85% and 98% were removed at 100ºC and 250ºC, respectively. Closer analysis of the volatility of particles emitted during transient cycles showed that volatilisation began at around 40°C with the majority occurring by 80°C. Particles produced during hard acceleration from rest exhibited lower volatility than that produced during other times of the cycle. Based on our results and the observation of ash deposits on the walls of the tailpipes, we suggest that these non-volatile particles were composed mostly of ash from lubricating oil. Heating the diesel bus emissions to 100ºC removed ultrafine particle numbers by 69% to 82% when a nucleation mode was present and just 18% when it was not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growing importance and need of data processing for information extraction is vital for Web databases. Due to the sheer size and volume of databases, retrieval of relevant information as needed by users has become a cumbersome process. Information seekers are faced by information overloading - too many result sets are returned for their queries. Moreover, too few or no results are returned if a specific query is asked. This paper proposes a ranking algorithm that gives higher preference to a user’s current search and also utilizes profile information in order to obtain the relevant results for a user’s query.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of artificial intelligence in computer games is an important component of a player's game play experience. As games are becoming more life-like and interactive, the need for more realistic game AI will increase. This is particularly the case with respect to AI that simulates how human players act, behave and make decisions. The purpose of this research is to establish a model of player-like behavior that may be effectively used to inform the design of artificial intelligence to more accurately mimic a player's decision making process. The research uses a qualitative analysis of player opinions and reactions while playing a first person shooter video game, with recordings of their in game actions, speech and facial characteristics. The initial studies provide player data that has been used to design a model of how a player behaves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Materials with one-dimensional (1D) nanostructure are important for catalysis. They are the preferred building blocks for catalytic nanoarchitecture, and can be used to fabricate designer catalysts. In this thesis, one such material, alumina nanofibre, was used as a precursor to prepare a range of nanocomposite catalysts. Utilising the specific properties of alumina nanofibres, a novel approach was developed to prepare macro-mesoporous nanocomposites, which consist of a stacked, fibrous nanocomposite with a core-shell structure. Two kinds of fibrous ZrO2/Al2O3 and TiO2/Al2O3 nanocomposites were successfully synthesised using boehmite nanofibers as a hard temperate and followed by a simple calcination. The alumina nanofibres provide the resultant nanocomposites with good thermal stability and mechanical stability. A series of one-dimensional (1D) zirconia/alumina nanocomposites were prepared by the deposition of zirconium species onto the 3D framework of boehmite nanofibres formed by dispersing boehmite nanofibres into a butanol solution, followed by calcination at 773 K. The materials were characterised by X-ray diffraction (XRD), Scanning electron microscopy (SEM), Transmission electron microscope (TEM), N2 adsorption/desorption, Infrared Emission Spectroscopy (IES), and Fourier Transform Infrared spectroscopy (FT-IR). The results demonstrated that when the molar percentage, X, X=100*Zr/(Al+Zr), was > 30%, extremely long ZrO2/Al2O3 composite nanorods with evenly distributed ZrO2 nanocrystals formed on their surface. The stacking of such nanorods gave rise to a new kind of macroporous material without the use of any organic space filler\template or other specific drying techniques. The mechanism for the formation of these long ZrO2/Al2O3 composite nanorods is proposed in this work. A series of solid-superacid catalysts were synthesised from fibrous ZrO2/Al2O3 core and shell nanocomposites. In this series, the zirconium molar percentage was varied from 2 % to 50 %. The ZrO2/Al2O3 nanocomposites and their solid superacid counterparts were characterised by a variety of techniques including 27Al MAS-NMR, SEM, TEM, XPS, Nitrogen adsorption and Infrared Emission Spectroscopy. NMR results show that the interaction between zirconia species and alumina strongly correlates with pentacoordinated aluminium sites. This can also be detected by the change in binding energy of the 3d electrons of the zirconium. The acidity of the obtained superacids was tested by using them as catalysts for the benzolyation of toluene. It was found that a sample with a 50 % zirconium molar percentage possessed the highest surface acidity equalling that of pristine sulfated zirconia despite the reduced mass of zirconia. Preparation of hierarchically macro-mesoporous catalyst by loading nanocrystallites on the framework of alumina bundles can provide an alternative system to design advanced nanocomposite catalyst with enhanced performance. A series of macro-mesoporous TiO2/Al2O3 nanocomposites with different morphologies were synthesised. The materials were calcined at 723 K and were characterised by X-ray diffraction (XRD), Scanning electron microscopy (SEM), Transmission electron microscope (TEM), N2 adsorption/desorption, Infrared Emission Spectroscopy (IES), and UV-visible spectroscopy (UV-visible). A modified approach was proposed for the synthesis of 1D (fibrous) nanocomposite with higher Ti/Al molar ratio (2:1) at lower temperature (<100oC), which makes it possible to synthesize such materials on industrial scale. The performances of a series of resultant TiO2/Al2O3 nanocomposites with different morphologies were evaluated as a photocatalyst for the phenol degradation under UV irradiation. The photocatalyst (Ti/Al =2) with fibrous morphology exhibits higher activity than that of the photocatalyst with microspherical morphology which indeed has the highest Ti to Al molar ratio (Ti/Al =3) in the series of as-synthesised hierarchical TiO2/Al2O3 nanocomposites. Furthermore, the photocatalytic performances, for the fibrous nanocomposites with Ti/Al=2, were optimized by calcination at elevated temperatures. The nanocomposite prepared by calcination at 750oC exhibits the highest catalytic activity, and its performance per TiO2 unit is very close to that of the gold standard, Degussa P 25. This work also emphasizes two advantages of the nanocomposites with fibrous morphology: (1) the resistance to sintering, and (2) good catalyst recovery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For people with intellectual disabilities there are significant barriers to inclusion in socially cooperative endeavours. This paper investigates the effectiveness of Stomp, a tangible user interface (TUI) designed to provide new participatory experiences for people with intellectual disability. Results from an observational study reveal the extent to which the Stomp system supports social and physical interaction. The tangible, spatial and embodied qualities of Stomp result in an experience that does not rely on the acquisition of specific competencies before interaction and engagement can occur.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, No-Wait, No-Buffer, Limited-Buffer, and Infinite-Buffer conditions for the flow-shop problem (FSP) have been investigated. These four different buffer conditions have been combined to generate a new class of scheduling problem, which is significant for modelling many real-world scheduling problems. A new heuristic algorithm is developed to solve this strongly NP-hard problem. Detailed numerical implementations have been analysed and promising results have been achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Local governments struggle to engage time poor and seemingly apathetic citizens, as well as the city’s young digital natives, the digital locals. This project aims at providing a lightweight, technological contribution towards removing the hierarchy between those who build the city and those who use it. We aim to narrow this gap by enhancing people’s experience of physical spaces with digital, civic technologies that are directly accessible within that space. This paper presents the findings of a design trial allowing users to interact with a public screen via their mobile phones. The screen facilitated a feedback platform about a concrete urban planning project by promoting specific questions and encouraging direct, in-situ, real-time responses via SMS and twitter. This new mechanism offers additional benefits for civic participation as it gives voice to residents who otherwise would not be heard. It also promotes a positive attitude towards local governments and gathers information different from more traditional public engagement tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effective digital human model (DHM) simulation of automotive driver packaging ergonomics, safety and comfort depends on accurate modelling of occupant posture, which is strongly related to the mechanical interaction between human body soft tissue and flexible seat components. This paper comprises: a study investigating the component mechanical behaviour of a spring-suspended, production level seat when indented by SAE J826 type, human thigh-buttock representing hard shell; a model of seated human buttock shape for improved indenter design using a multivariate representation of Australian population thigh-buttock anthropometry; and a finite-element study simulating the deflection of human buttock and thigh soft tissue when seated, based on seated MRI. The results of the three studies provide a description of the mechanical properties of the driver-seat interface, and allow validation of future dynamic simulations, involving multi-body and finite-element (FE) DHM in virtual ergonomic studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Central to multi-stakeholder processes of participatory innovation is to generate knowledge about ‘users’ and to identify business opportunities accordingly. In these processes of collaborative analysis and synthesis, conflicting perceptions within and about a field of interest are likely to surface. Instead of the natural tendency to avoid these tensions, we demonstrate how tensions can be utilized by embodying them in provocative types (provotypes). Provotypes expose and embody tensions that surround a field of interest to support collaborative analysis and collaborative design explorations across stakeholders. In this paper we map how provotyping contributes to four related areas of contemporary Interaction Design practice. Through a case study that brings together stakeholders from the field of indoor climate, we provide characteristics of design provocations and design guidelines for provotypes for participatory innovation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The National Cultural Policy (NCP) Discussion Paper highlights that the ‘National Broadband Network, with its high-speed broadband, will enable new opportunities for developing and delivering Australian content and applications reflecting our diverse culture and interests’.1 A significant source of content and knowledge is our books, in particular, out of print, in copyright books and books in the public domain. More and more people, especially those who are digitally literate, will demand that the store of knowledge in these hard-to-find (and at times, decaying) books be digitised and made readily accessible on the internet...