929 resultados para mode of operation
Resumo:
In this paper we focus on one facet of Asia literacy and examine the potential of intercultural understanding through two films about Asians in Australia, as the basis for exploring Asia and Australia’s engagement with Asia 'inside' and not through the more accepted mode of 'outside' the nation. In doing so we foreground how teachers’ critical and imaginative curriculum work can realise some of the promises of the framing document for the current national curriculum project, the Melbourne Declaration (MCEECDYA, 2008). In particular, we focus on opportunities for young people to develop an Asia-related cultural literacy that goes beyond instrumental notions of engagement with Asia and explore the evolving nature of contemporary Australian society; a society that continues to develop in response to regional flows and interactions with people and cultures. To this end we engage with the notion of “diasporic hybridity” as a dynamic cultural space through selected films and literature, about Asia in Australia, in particular, Bondi Tsunami (Lucas, 2004) and Footy Legends (Do, 2006) and selected prose works. Our paper introduces the policy background of the Australian Curriculum and suggests multimodal, English classroom applications for the films and literature under study.
Resumo:
Bus Rapid Transit (BRT) station is the interface between passenger and service. The station is crucial to line operation as it is typically the only location where buses can pass each other. Congestion may occur here when buses maneuvering into and out of the platform lane interfere with bus flow, or when a queue of buses forms upstream of the platform lane blocking the passing lane. However, some systems include operation where express buses pass the critical station, resulting in a proportion of non stopping buses. It is important to understand the operation of the critical busway station under this type of operation, as it affects busway line capacity. This study uses micro simulation to treat the BRT station operation and to analyze the relationship between station Limit state bus capacity (B_ls), Total Bus Capacity (B_ttl). First, the simulation model is developed for Limit state scenario and then a mathematical model is defined, calibrated for a specified range of controlled scenarios of mean and coefficient of variation of dwell time. Thereafter, the proposed B_ls model is extended to consider non stopping buses and B_ttlmodel is defined. The proposed models provides better understanding to the BRT line capacity and is useful for transit authorities for designing better BRT operation.
Resumo:
The aims of this study were to examine the plasma concentrations of inflammatory mediators including cytokines induced by a single bout of eccentric exercise and again 4 weeks later by a second bout of eccentric exercise of the same muscle group. Ten untrained male subjects performed two bouts of the eccentric exercise involving the elbow flexors (6 sets of 5 repetitions) separated by four weeks. Changes in muscle soreness, swelling, and function following exercise were compared between the bouts. Blood was sampled before, immediately after, 1 h, 3 h, 6 h, 24 h (1 d), 48 h (2 d), 72 h (3 d), 96 h (4 d) following exercise bout to measure plasma creatine kinase (CK) activity, plasma concentrations of myoglobin (Mb), interleukin (IL)-1beta, IL-1 receptor antagonist (IL-1ra), IL-4, IL-6, IL-8, IL-10, IL-12p40, tumor necrosis factor (TNF)-alpha, granulocyte colony-stimulating factor (G-CSF), myeloperoxidase (MPO), prostaglandin E2 (PGE2), heat shock protein (HSP) 60 and 70. After the first bout, muscle soreness increased significantly, and there was also significant increase in upper arm circumference; muscle function decreased and plasma CK activity and Mb concentration increased significantly. These changes were significantly smaller after the second bout compared to the first bout, indicating muscle adaptation to the repeated bouts of the eccentric exercise. Despite the evidence of greater muscle damage after the first bout, the changes in cytokines and other inflammatory mediators were quite minor, and considerably smaller than that following endurance exercise. These results suggest that eccentric exercise-induced muscle damage is not associated with the significant release of cytokines into the systemic circulation. After the first bout, plasma G-CSF concentration showed a small but significant increase, whereas TNF-alpha and IL-8 showed significant decreases compared to the pre-exercise values. After the second bout, there was a significant increase in IL-10, and a significant decrease in IL-8. In conclusion, although there was evidence of severe muscle damage after the eccentric exercise, this muscle damage was not accompanied by any large changes in plasma cytokine concentrations. The minor changes in systemic cytokine concentration found in this study might reflect more rapid clearance from the circulation, or a lack of any significant metabolic or oxidative demands during this particular mode of exercise. In relation to the adaptation to the muscle damage, the anti-inflammatory cytokine IL-10 might work as one of the underlying mechanisms of action.
Resumo:
Incidence of disease due to dengue (DENV), chikungunya (CHIKV) and yellow fever (YFV) viruses is increasing in many parts of the world. The viruses are primarily transmitted by Aedes aegypti, a highly domesticated mosquito species that is notoriously difficult to control. When transinfected into Ae. aegypti, the intracellular bacterium Wolbachia has recently been shown to inhibit replication of DENVs, CHIKV, malaria parasites and filarial nematodes, providing a potentially powerful biocontrol strategy for human pathogens. Because the extent of pathogen reduction can be influenced by the strain of bacterium, we examined whether the wMel strain of Wolbachia influenced CHIKV and YFV infection in Ae. aegypti. Following exposure to viremic blood meals, CHIKV infection and dissemination rates were significantly reduced in mosquitoes with the wMel strain of Wolbachia compared to Wolbachia-uninfected controls. However, similar rates of infection and dissemination were observed in wMel infected and non-infected Ae. aegypti when intrathoracic inoculation was used to deliver virus. YFV infection, dissemination and replication were similar in wMel-infected and control mosquitoes following intrathoracic inoculations. In contrast, mosquitoes with the wMelPop strain of Wolbachia showed at least a 10(4) times reduction in YFV RNA copies compared to controls. The extent of reduction in virus infection depended on Wolbachia strain, titer and strain of the virus, and mode of exposure. Although originally proposed for dengue biocontrol, our results indicate a Wolbachia-based strategy also holds considerable promise for YFV and CHIKV suppression.
Resumo:
Meyerhofferite is a calcium hydrated borate mineral with ideal formula: CaB3O3(OH)5�H2O and occurs as white complex acicular to crude crystals with length up to �4 cm, in fibrous divergent, radiating aggregates or reticulated and is often found in sedimentary or lake-bed borate deposits. The Raman spectrum of meyerhofferite is dominated by intense sharp band at 880 cm�1 assigned to the symmetric stretching mode of trigonal boron. Broad Raman bands at 1046, 1110, 1135 and 1201 cm�1 are attributed to BOH in-plane bending modes. Raman bands in the 900–1000 cm�1 spectral region are assigned to the antisymmetric stretching of tetrahedral boron. Distinct OH stretching Raman bands are observed at 3400, 3483 and 3608 cm�1. The mineral meyerhofferite has a distinct Raman spectrum which is different from the spectrum of other borate minerals, making Raman spectroscopy a very useful tool for the detection of meyerhofferite in sedimentary and lake bed deposits.
Resumo:
This thesis reports on an investigation to develop an advanced and comprehensive milling process model of the raw sugar factory. Although the new model can be applied to both, the four-roller and six-roller milling units, it is primarily developed for the six-roller mills which are widely used in the Australian sugar industry. The approach taken was to gain an understanding of the previous milling process simulation model "MILSIM" developed at the University of Queensland nearly four decades ago. Although the MILSIM model was widely adopted in the Australian sugar industry for simulating the milling process it did have some incorrect assumptions. The study aimed to eliminate all the incorrect assumptions of the previous model and develop an advanced model that represents the milling process correctly and tracks the flow of other cane components in the milling process which have not been considered in the previous models. The development of the milling process model was done is three stages. Firstly, an enhanced milling unit extraction model (MILEX) was developed to access the mill performance parameters and predict the extraction performance of the milling process. New definitions for the milling performance parameters were developed and a complete milling train along with the juice screen was modelled. The MILEX model was validated with factory data and the variation in the mill performance parameters was observed and studied. Some case studies were undertaken to study the effect of fibre in juice streams, juice in cush return and imbibition% fibre on extraction performance of the milling process. It was concluded from the study that the empirical relations developed for the mill performance parameters in the MILSIM model were not applicable to the new model. New empirical relations have to be developed before the model is applied with confidence. Secondly, a soluble and insoluble solids model was developed using modelling theory and experimental data to track the flow of sucrose (pol), reducing sugars (glucose and fructose), soluble ash, true fibre and mud solids entering the milling train through the cane supply and their distribution in juice and bagasse streams.. The soluble impurities and mud solids in cane affect the performance of the milling train and further processing of juice and bagasse. New mill performance parameters were developed in the model to track the flow of cane components. The developed model is the first of its kind and provides some additional insight regarding the flow of soluble and insoluble cane components and the factors affecting their distribution in juice and bagasse. The model proved to be a good extension to the MILEX model to study the overall performance of the milling train. Thirdly, the developed models were incorporated in a proprietary software package "SysCAD’ for advanced operational efficiency and for availability in the ‘whole of factory’ model. The MILEX model was developed in SysCAD software to represent a single milling unit. Eventually the entire milling train and the juice screen were developed in SysCAD using series of different controllers and features of the software. The models developed in SysCAD can be run from macro enabled excel file and reports can be generated in excel sheets. The flexibility of the software, ease of use and other advantages are described broadly in the relevant chapter. The MILEX model is developed in static mode and dynamic mode. The application of the dynamic mode of the model is still under progress.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Bermanite Mn2þMn3þ2 ðPO4Þ2ðOHÞ2 � 4ðH2OÞ is a mixed valent hydrated hydroxy phosphate mineral. The mineral is reddish-brown and occurs in crystal aggregates and as lamellar masses. Bermanite is a common mineral in granitic pegmatites. The chemical composition of bermanite was obtained using EDS techniques. We have studied the molecular structure of bermanite using vibrational spectroscopy. The mineral is characterized by a Raman doublet at 991 and 999 cm-1 attributed to the phosphate stretching mode of two non-equivalent phosphate units. Raman bands at 1071, 1117 and 1142 cm-1 are assigned to the phosphate antisymmetric stretching modes. The hydroxyl stretching spectral region is complex with overlapping bands attributed to water and hydroxyl stretching vibrations. Vibrational spectroscopy proves most useful for the study of the mineral bermanite.
Resumo:
Lanthanum Strontium Manganate (LSM) powders were synthesized by six different routes, namely solid state reaction, drip pyrolysis, citrate, sol-gel, carbonate and oxalate co-precipitation. The LSM samples, produced by firing to 1000 °C for 5 h were then characterized by way of XRD, TPD's of oxygen, TPR and catalytic activity for a simple oxidation reaction, that of carbon monoxide to carbon dioxide. It was found that although the six samples had similar compositions and surface areas they performed quite differently during catalytic characterization. These observed differences correlated more closely to the mode of synthesis, than to the physical properties of the powders, or their impurity levels, indicating that the surface structures created by the different syntheses perform very differently under catalysis conditions. Co-precipitation and drip pyrolysis produced structures that were most efficient at facilitating oxidation type reactions.
Resumo:
School guidance counsellors world-wide seek ways of providing appropriate professional assistance to all students. While young people integrate online technology into their daily lives and go online for information and to communicate with each other, school counsellors in Australia are not offering online support to students. This cross-sectional study reported on the reluctance of school counsellors to offer online counselling and the reasons for this. A survey of 210 school guidance counsellors found that there is conditional support for the introduction of online counselling into the school setting. Counsellors indicated that they would use online counselling if students accepted its use in the school setting though they question how genuine students would be in its use. Most respondents reported a lack of confidence in understanding the ethical and legal implications of online counselling. However, the majority of participants were prepared to undertake further professional development in this mode of counselling. Additionally, they sought confirmation of the effectiveness of counselling students online before committing themselves to it. The implications for school guidance practice are discussed.
Resumo:
The development of toll roads in Indonesia started around 1978. Initially, the management and development of toll roads sat directly under the Government of Indonesia (GoI) being undertaken through PT JasaMarga, a state owned enterprise specifically established to provide toll roads. Due to the slow growth and low capability of toll roads to fulfil infrastructure needs in the first ten years of operation (only 2.688kms/year), GoI changed its strategy in 1989 to one of using private sector participation for roads delivery through a Public Private Partnership (PPP) scheme. In this latter period, PT JasaMarga had two roles, both as regulator on behalf of the private sector as well as being the operator. However, from 1989 to 2004 the growth rate of toll roads actually decreased further to 2.300kms/year. Facing this challenge of low growth rate of toll roads, in 2004GoI changed the toll road management system and the role of regulator was returned to the Government through the establishment of the Toll Road Regulatory Agency (BPJT). GoI also amended the institutional framework to strengthen the toll road management system. Despite the introduction of this new institutional framework, the growth of toll roads still showed insignificant change. This problem in toll road development has generated an urgent need for research into this issue. The aim of the research is to understand the performance of the new institutional framework in enhancing PPP procured toll road development. The methodology of the research was to undertake a questionnaire survey distributed to private sector respondents involved in toll road development. The results of this study show that there are several problems inherent in the institutional framework, but the most significant problem comes from the uncertainty of the function of the strategic executive body in the land expropriation process.
Resumo:
In Australia, and elsewhere, the movement of trains on long-haul rail networks is usually planned in advance. Typically, a train plan is developed to confirm that the required train movements and track maintenance activities can occur. The plan specifies when track segments will be occupied by particular trains and maintenance activities. On the day of operation, a train controller monitors and controls the movement of trains and maintenance crews, and updates the train plan in response to unplanned disruptions. It can be difficult to predict how good a plan will be in practice. The main performance indicator for a train service should be reliability - the proportion of trains running the service that complete at or before the scheduled time. We define the robustness of a planned train service to be the expected reliability. The robustness of individual train services and for a train plan as a whole can be estimated by simulating the train plan many times with random, but realistic, perturbations to train departure times and segment durations, and then analysing the distributions of arrival times. This process can also be used to set arrival times that will achieve a desired level of robustness for each train service.
Resumo:
Migraine is a common neurological condition with a complex mode of inheritance. Steroid hormones have long been implicated in migraine, although their role remains unclear. Our investigation considered that genes involved in hormonal pathways may play a role in migraine susceptibility. We therefore investigated the androgen receptor (AR) CAG repeat, and the progesterone receptor (PR) PROGINS insert by cross-sectional association analysis. The results showed no association with the AR CAG repeat in our study group of 275 migraineurs and 275 unrelated controls. Results of the PR PROGINS analysis showed a significant difference in the same cohort, and in an independent follow-up study population of 300 migraineurs and 300 unrelated controls. Analysis of the genotypic risk groups of both populations together indicated that individuals who carried the PROGINS insert were 1.8 times more likely to suffer migraine. Interaction analysis of the PROGINS variant with our previously reported associated ESR1 594A variant showed that individuals who possessed at least one copy of both risk alleles were 3.2 times more likely to suffer migraine. Hence, variants of these steroid hormone receptor genes appear to act synergistically to increase the risk of migraine by a factor of three.
Resumo:
Natural single-crystal specimens of barbosalite from Brazil, with general formula Fe2+Fe3+ 2 (PO4)2(OH)2 were investigated by Raman and infrared spectroscopy. The mineral occurs as secondary products in granitic pegmatites. The Raman spectrum of barbosalite is characterized by bands at 1020, 1033 and 1044 cm−1 cm−1, assigned to ν1 symmetric stretching mode of the HOPO3- 3 and PO3- 4 units. Raman bands at around 1067, 1083 and 1138 cm−1 are attributed to both the HOP and PO antisymmetric stretching vibrations. The set of Raman bands observed at 575, 589 and 606 cm−1 are assigned to the ν4 out of plane bending modes of the PO4 and H2PO4 units. Raman bands at 439, 461, 475 and 503 cm−1 are attributed to the ν2 PO4 and H2PO4 bending modes. Strong Raman bands observed at 312, 346 cm−1 with shoulder bands at 361, 381 and 398 cm−1 are assigned to FeO stretching vibrations. No bands which are attributable to water vibrations were found. Vibrational spectroscopy enables aspects of the molecular structure of barbosalite to be assessed.
Resumo:
We have undertaken a study of the mineral inderite Mg(H4B3O7)(OH)⋅5H2O a hydrated hydroxy borate mineral of magnesium using scanning electron microscopy, thermogravimetry and vibrational spectroscopic techniques. The structure consists of [B3O3(OH)5]2-[B3O3(OH)5]2- soroborate groups and Mg(OH)2(H2O)4 octahedra interconnected into discrete molecules by the sharing of two OH groups. Thermogravimetry shows a mass loss of 47.2% at 137.5 °C, proving the mineral is thermally unstable. Raman bands at 954, 1047 and 1116 cm−1 are assigned to the trigonal symmetric stretching mode. The two bands at 880 and 916 cm−1 are attributed to the symmetric stretching mode of the tetrahedral boron. Both the Raman and infrared spectra of inderite show complexity. Raman bands are observed at 3052, 3233, 3330, 3392 attributed to water stretching vibrations and 3459 cm−1 with sharper bands at 3459, 3530 and 3562 cm−1 assigned to OH stretching vibrations. Vibrational spectroscopy is used to assess the molecular structure of inderite.