982 resultados para Classifying Party Systems


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the fire performance results of light gauge steel frame (LSF) walls lined with single and double plasterboards, and externally insulated with rock fibre insulation as obtained using a finite element analysis based parametric study. A validated numerical model was used to study the influence of various fire curves developed for a range of compartment characteristics. Data from the parametric study was utilized to develop a simplified method to predict the fire resistance ratings of LSF walls exposed to realistic design fire curves. Further, this paper also presents the details of suitable fire design rules based on current cold-formed steel standards and the modifications proposed by previous researchers. Of these the recently developed design rules by Gunalan and Mahendran [1] were investigated to determine their applicability to predict the axial compression strengths and fire resistance ratings (FRR) of LSF walls exposed to realistic design fires. Finally, the stud failure times obtained from fire design rules and finite element studies were compared for LSF walls lined with single and double plasterboards, and externally insulated with rock fibres under realistic design fire curves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

These lecture notes highlight some of the recent applications of multi-objective and multidisciplinary design optimisation in aeronautical design using the framework and methodology described in References 8, 23, 24 and in Part 1 and 2 of the notes. A summary of the methodology is described and the treatment of uncertainties in flight conditions parameters by the HAPEAs software and game strategies is introduced. Several test cases dealing with detailed design and computed with the software are presented and results discussed in section 4 of these notes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The control of the generation and assembly of the electronegative plasma-grown particles is discussed. Due to the large number of elementary processes of particle creation and loss, electronegative complex plasmas should be treated as open systems where the stationary states are sustained by various particle creation and loss processes in the plasma bulk, on the walls, and on the dust grain surfaces. To be physically self-consistent, ionization, diffusion, electron attachment, recombination, dust charge variation, and dissipation due to electron and ion elastic collisions with neutrals and fine particles, as well as charging collisions with the dust, must be accounted for.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An overview of dynamic self-organization phenomena in complex ionized gas systems, associated physical phenomena, and industrial applications is presented. The most recent experimental, theoretical, and modeling efforts to understand the growth mechanisms and dynamics of nano- and micron-sized particles, as well as the unique properties of the plasma-particle systems (colloidal, or complex plasmas) and the associated physical phenomena are reviewed and the major technological applications of micro- and nanoparticles are discussed. Until recently, such particles were considered mostly as a potential hazard for the microelectronic manufacturing and significant efforts were applied to remove them from the processing volume or suppress the gas-phase coagulation. Nowadays, fine clusters and particulates find numerous challenging applications in fundamental science as well as in nanotechnology and other leading high-tech industries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Matrix converter (MC) based bi-directional inductive power transfer (BD-IPT) systems are gaining popularity as an efficient and reliable technique with single stage grid integration as opposed to two stage grid integration of conventional grid connected BD-IPT systems. However MCs are invariably rich in harmonics and thus affect both power quality and power factor on the grid side. This paper proposes a mathematical model through which the grid side harmonics of MC based BD-IPT systems can accurately be estimated. The validity of the proposed mathematical model is verified using simulated results of a 3 kW BD-IPT system and results suggest that the MC based BD-IPT systems have a better power factor with higher power quality over conventional grid connected rectifier based systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise Systems have been touted as a key driver of delivering benefits through innovation in corporate Information Systems. The advent of such systems expects to deliver best practices that improve organizational performance. Yet, most Enterprise System installations struggle to see lifecycle-wide value of it. Considering that Enterprise Systems deliver lifecycle-wide innovation; we observe organizational readiness for lifecycle-wide Enterprise Systems innovation. The A VICTORY apriori model compares contributions of eight constructs for organizational readiness for continuous Enterprise Systems innovation. The model is tested responses of both client and implementation partner. Results indicate that six of the eight constructs of readiness make significant contributions to organizational readiness for Enterprise Systems innovation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A quasi-Poisson generalized linear model combined with a distributed lag non-linear model was used to quantify the main effect of temperature on emergency department visits (EDVs) for childhood diarrhea in Brisbane from 2001 to 2010. Residual of the model was checked to examine whether there was an added effect due to heat waves. The change over time in temperature-diarrhea relation was also assessed. Both low and high temperatures had significant impact on childhood diarrhea. Heat waves had an added effect on childhood diarrhea, and this effect increased with intensity and duration of heat waves. There was a decreasing trend in the main effect of heat on childhood diarrhea in Brisbane across the study period. Brisbane children appeared to have gradually adapted to mild heat, but they are still very sensitive to persistent extreme heat. Development of future heat alert systems should take the change in temperature-diarrhea relation over time into account.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the coming decades, the mining industry faces the dual challenge of lowering both its water and energy use. This presents a difficulty since technological advances that decrease the use of one can increase the use of the other. Historically, energy and water use have been modelled independently, making it difficult to evaluate the true costs and benefits from water and energy improvements. This paper presents a hierarchical systems model that is able to represent interconnected water and energy use at a whole of site scale. In order to explore the links between water and energy four technologies advancements have been modelled: use of dust suppression additives, the adoption of thickened tailings, the transition to dry processing and the incorporation of a treatment plant. The results show a synergy between decreased water and energy use for dust suppression additives, but a trade-off for the others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Safety at railway level crossings (RLX) is one part of a wider picture of safety within the whole transport system. Governments, the rail industry and road organisations have used a variety of countermeasures for many years to improve RLX safety. New types of interventions are required in order to reduce the number of crashes and associated social costs at railway crossings. This paper presents the results of a large research program which aimed to assess the effectiveness of emerging Intelligent Transport Systems (ITS) interventions, both on-road and in-vehicle based, to improve the safety of car drivers at RLXs in Australia. The three most promising technologies selected from the literature review and focus groups were tested in an advanced driving simulator to provide a detailed assessment of their effects on driver behaviour. The three interventions were: (i) in-vehicle visual warning using a GPS/smartphone navigation-like system, (ii) in-vehicle audio warning and; (iii) on-road intervention known as valet system (warning lights on the road surface activated as a train approaches). The effects of these technologies on 57 participants were assessed in a systematic approach focusing on the safety of the intervention, effects on the road traffic around the crossings and driver’s acceptance of the technology. Given that the ITS interventions were likely to provide a benefit by improving the driver’s awareness of the crossing status in low visibility conditions, such conditions were investigated through curves in the track before arriving at the crossing. ITS interventions were also expected to improve driver behaviour at crossings with high traffic (blocking back issue), which were also investigated at active crossings. The key findings are: (i) interventions at passive crossings are likely to provide safety benefits; (ii) the benefits of ITS interventions on driver behaviour at active crossings are limited; (iii) the trialled ITS interventions did not show any issues in terms of driver distraction, driver acceptance or traffic delays; (iv) these interventions are easy to use, do not increase driver workload substantially; (v) participants’ intention to use the technology is high and; (vi) participants saw most value in succinct messages about approaching trains as opposed to knowing the RLX locations or the imminence of a collision with a train.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design Science is the process of solving ‘wicked problems’ through designing, developing, instantiating, and evaluating novel solutions (Hevner, March, Park and Ram, 2004). Wicked problems are described as agent finitude in combination with problem complexity and normative constraint (Farrell and Hooker, 2013). In Information Systems Design Science, determining that problems are ‘wicked’ differentiates Design Science research from Solutions Engineering (Winter, 2008) and is a necessary part of proving the relevance to Information Systems Design Science research (Hevner, 2007; Iivari, 2007). Problem complexity is characterised as many problem components with nested, dependent and co-dependent relationships interacting through multiple feedback and feed-forward loops. Farrell and Hooker (2013) specifically state for wicked problems “it will often be impossible to disentangle the consequences of specific actions from those of other co-occurring interactions”. This paper discusses the application of an Enterprise Information Architecture modelling technique to disentangle the wicked problem complexity for one case. It proposes that such a modelling technique can be applied to other wicked problems and can lay the foundations for proving relevancy to DSR, provide solution pathways for artefact development, and aid to substantiate those elements required to produce Design Theory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numerical simulation of a geothermal reservoir, modelled as a bottom-heated square box, filled with water-CO2 mixture is presented in this work. Furthermore, results for two limiting cases of a reservoir filled with either pure water or CO2 are presented. Effects of different parameters including CO2 concentration as well as reservoir pressure and temperature on the overall performance of the system are investigated. It has been noted that, with a fixed reservoir pressure and temperature, any increase in CO2concentration leads to better performance, i.e. stronger convection and higher heat transfer rates. With a fixed CO2 concentration, however, the reservoir pressure and temperature can significantly affect the overall heat transfer and flow rate from the reservoir. Details of such variations are documented and discussed in the present paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For timely processing of the crop, sugar factories need boiler stations that can reliably produce steam when fired with fuel of variable quality. The control systems installed on most sugar factory boilers have changed little in the last thirty years and in some cases the default control system response to changes in fuel and/or fuel quality is not correct and operator intervention is required to prevent factory stoppages or reductions in crushing rate caused by poor combustion. Some factories have recently modified their boiler control systems for improved combustion performance and reduced maintenance costs. This paper describes testing carried out to evaluate some of these control system modifications and identifies boiler control system changes that can be applied more widely in the sugar industry.