981 resultados para Economical energetic analysis
Resumo:
Fibres are extremely common. They can originate directly from human and animal hair, and also from textiles in the form of clothing, upholstery and carpets. Hair and textile fibres are relatively easily shed and transferred, which means that it is highly likely that fibres will be found at crime scenes. If such fibres are carefully characterised they can be of immense value in the forensic environment. Vibrational spectroscopy is one of the most important methods for the characterisation of natural and synthetic fibres. The vibrational spectrum, whether mid-IR or Raman, can be considered to be a fingerprint of the molecular structure of the fibre and as such has a very high information content.
Resumo:
Selecting an appropriate design-builder is critical to the success of DB projects. The objective of this study is to identify selection criteria for design-builders and compare their relative importance by means of a robust content analysis of 94 Request For Proposals (RFPs) for public DB projects. These DB projects had an aggregate contract value of over US$3.5 billion and were advertised between 2000 and 2010. This study summarized twenty-six selection criteria and classified into ten categories, i.e.: price, experience, technical approach, management approach, qualification, schedule, past performance, financial capability, responsiveness to the RFP, and legal status in descending order of their relative importance. The results showed that even though price still remains as the most important selection category, its relative importance declines significantly in the last decade. The categories of qualification, experience, past performance, by contrast, have been becoming more important to DB owners for selecting design-builders. Finally, it is found that the importance weighting of price in large projects is significantly higher than that in small projects. This study provides a useful reference for owners in selecting their preferred design-builders.
Resumo:
The two-phrase best-value process has been widely used by public agencies for Design and Build (DB) procurement, with a key issue in the first phase of pre-qualification being the determination of evaluation criteria. This study identified a set of general qualification criteria for design-builders and compares their relative importance by a thorough content analysis of 97 Requests for Qualification (RFQ) for public DB projects advertised between 2000 and 2011 in various regions of the USA. The thirty-nine qualification criteria found are summarized and classified into eight categories comprising: experience; project understanding and approach; organizational structure and capacity; past performance record; professional qualifications; responsiveness to RFQs, office location and familiarity with local environment; and legal status in descending order of their relative importance. A comparative analysis of different types of projects shows that the relative weightings of the qualification criteria vary according to different characteristics of the DB projects involved.
Resumo:
The paper investigates train scheduling problems when prioritised trains and non-prioritised trains are simultaneously traversed in a single-line rail network. In this case, no-wait conditions arise because the prioritised trains such as express passenger trains should traverse continuously without any interruption. In comparison, non-prioritised trains such as freight trains are allowed to enter the next section immediately if possible or to remain in a section until the next section on the routing becomes available, which is thought of as a relaxation of no-wait conditions. With thorough analysis of the structural properties of the No-Wait Blocking Parallel-Machine Job-Shop-Scheduling (NWBPMJSS) problem that is originated in this research, an innovative generic constructive algorithm (called NWBPMJSS_Liu-Kozan) is proposed to construct the feasible train timetable in terms of a given order of trains. In particular, the proposed NWBPMJSS_Liu-Kozan constructive algorithm comprises several recursively-used sub-algorithms (i.e. Best-Starting-Time-Determination Procedure, Blocking-Time-Determination Procedure, Conflict-Checking Procedure, Conflict-Eliminating Procedure, Tune-up Procedure and Fine-tune Procedure) to guarantee feasibility by satisfying the blocking, no-wait, deadlock-free and conflict-free constraints. A two-stage hybrid heuristic algorithm (NWBPMJSS_Liu-Kozan-BIH) is developed by combining the NWBPMJSS_Liu-Kozan constructive algorithm and the Best-Insertion-Heuristic (BIH) algorithm to find the preferable train schedule in an efficient and economical way. Extensive computational experiments show that the proposed methodology is promising because it can be applied as a standard and fundamental toolbox for identifying, analysing, modelling and solving real-world scheduling problems.
Resumo:
This study explores the international entrepreneurial values influencing the intensity of Internet use in the internationalization process of small to medium sized enterprises (SMEs), within the Australian tourism industry. The findings point to a relationship between the values of international entrepreneurs and the inclination of the firm to develop and initiate international activity. And so, this study endeavors to offer insight into issues that remain unresolved in existing tourism and international entrepreneurship (IE) literature. Two effective but underutilized qualitative methods were used in this study to identify the values of international entrepreneurs. They are repertory test and laddering analysis.
Resumo:
Discovering factors that help or impede business model change is an important quest, both for researchers and practitioners. In this study we present preliminary findings based on the CAUSEE survey of young and nascent firms in Australia. In particular, we seek to determine an association between business model adaptation and external orientation among young and nascent firms within the random sample and amongst an oversample of high potential firms. The concept of external orientation is made operational by asking respondents whether, and to what extent, they rely on certain sources of advice and information. We find that high potential firms are more likely to have made at least some change to their business model, that greater use of external sources of advice is generally significantly associated with business model adaptation, but also that there appear to be different patterns of behaviour between the random sample and the over sample.
Resumo:
Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
Critical futures studies is not about the careers of a few scholars, rather it is about projects that transcend the narrow boundaries of the self. This biographical monograph examines the life and work of Richard Slaughter and Sohail Inayatullah.
Resumo:
Abstract: LiteSteel beam (LSB) is a new cold-formed steel hollow flange channel beam produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. It has the beneficial characteristics of torsionally rigid closed rectangular flanges combined with economical fabrication processes from a single strip of high strength steel. Although the LSB sections are commonly used as flexural members, no research has been undertaken on the shear behaviour of LSBs. Therefore experimental and numerical studies were undertaken to investigate the shear behaviour and strength of LSBs. In this research finite element models of LSBs were developed to investigate their nonlinear shear behaviour including their buckling characteristics and ultimate shear strength. They were validated by comparing their results with available experimental results. The models provided full details of the shear buckling and strength characteristics of LSBs, and showed the presence of considerable improvements to web shear buckling in LSBs and associated post-buckling strength. This paper presents the details of the finite element models of LSBs and the results. Both finite element analysis and experimental results showed that the current design rules in cold-formed steel codes are very conservative for the shear design of LSBs. The ultimate shear capacities from finite element analyses confirmed the accuracy of proposed shear strength equations for LSBs based on the North American specification and DSM design equations. Developed finite element models were used to investigate the reduction to shear capacity of LSBs when full height web side plates were not used or when only one web side plate was used, and these results are also presented in this paper.
Resumo:
A novel method for genotyping the clustered, regularly interspaced short-palindromic-repeat (CRISPR) locus of Campylobacter jejuni is described. Following real-time PCR, CRISPR products were subjected to high-resolution melt (HRM) analysis, a new technology that allows precise melt profile determination of amplicons. This investigation shows that the CRISPR HRM assay provides a powerful addition to existing C. jejuni genotyping methods and emphasizes the potential of HRM for genotyping short sequence repeats in other species
Resumo:
Although complementary and alternative therapies (CATs) are utilised widely for treating psychological disorders, little research has examined psychologists' beliefs about integrating CAT into psychological practice. Six practicing psychologists and six psychology students were interviewed about their CAT integration beliefs, in particular integrating CAT into clinical practice via recommending CATs, offering referrals to CAT practitioners, or undertaking training to utilise CATs within psychological practice. Guided broadly from a theory of planned behaviour perspective, participants raised a number of costs and benefits, discussed referent groups who would influence their decisions, and suggested motivators and barriers for integration. A number of additional themes were raised, including risks, such as the possibility of litigation and the need for clear Society guidelines, as most participants were unclear about what constitutes appropriate practice. Identifying these themes serves as an important initial step to informing discussion and policy for this emerging practice issue within psychology.
Resumo:
The greatly increased risk of being killed or injured in a car crash for the young novice driver has been recognised in the road safety and injury prevention literature for decades. Risky driving behaviour has consistently been found to contribute to traffic crashes. Researchers have devised a number of instruments to measure this risky driving behaviour. One tool developed specifically to measure the risky behaviour of young novice drivers is the Behaviour of Young Novice Drivers Scale (BYNDS) (Scott-Parker et al., 2010). The BYNDS consists of 44 items comprising five subscales for transient violations, fixed violations, misjudgement, risky driving exposure, and driving in response to their mood. The factor structure of the BYNDS has not been examined since its development in a matched sample of 476 novice drivers aged 17-25 years. Method: The current research attempted to refine the BYNDS and explore its relationship with the self-reported crash and offence involvement and driving intentions of 390 drivers aged 17-25 years (M = 18.23, SD = 1.58) in Queensland, Australia, during their first six months of independent driving with a Provisional (intermediate) driver’s licence. A confirmatory factor analysis was undertaken examining the fit of the originally proposed BYNDS measurement model. Results: The model was not a good fit to the data. A number of iterations removed items with low factor loadings, resulting in a 36-item revised BYNDS which was a good fit to the data. The revised BYNDS was highly internally consistent. Crashes were associated with fixed violations, risky driving exposure, and misjudgement; offences were moderately associated with risky driving exposure and transient violations; and road-rule compliance intentions were highly associated with transient violations. Conclusions: Applications of the BYNDS in other young novice driver populations will further explore the factor structure of both the original and revised BYNDS. The relationships between BYNDS subscales and self-reported risky behaviour and attitudes can also inform countermeasure development, such as targeting young novice driver non-compliance through enforcement and education initiatives.