991 resultados para Engineering Day
Resumo:
Spaces without northerly orientations have an impact on the ‘energy behaviour’ of a building. This paper outlines possible energy savings and better performance achieved by different zenithal solar passive strategies (skylights, roof monitors and clerestory roof windows) and element arrangements across the roof in zones of cold to temperate climates typical of the central and central-southern Argentina. Analyses were undertaken considering daylighting, thermal and ventilation performances of the different strategies. The results indicate that heating,ventilation and lighting loads in spaces without an equator-facing facade can be significantly reduced by implementing solar passive strategies. In the thermal aspect, the solar saving fraction reached for the different strategies were averaged 43.16% for clerestories, 41.4% for roof monitors and 38.86% for skylights for a glass area of 9% to the floor area. The results also indicate average illuminance levels above 500 lux for the different clerestory and monitor arrangements, uniformity ratios of 0.66–0.82 for the most distributed arrangements and day-lighting factors between 11.78 and 20.30% for clear sky conditions, depending on the strategy. In addition, minimum air changes rates of 4 were reached for the most extreme conditions.
Resumo:
The anatomy and microstructure of the spine and in particular the intervertebral disc are intimately linked to how they operate in vivo and how they distribute loads to the adjacent musculature and bony anatomy. The degeneration of the intervertebral discs may be characterised by a loss of hydration, loss of disc height, a granular texture and the presence of annular lesions. As such, degeneration of the intervertebral discs compromises the mechanical integrity of their components and results in adaption and modification in the mechanical means by which loads are distributed between adjacent spinal motion segments.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language
Resumo:
Australia’s civil infrastructure assets of roads, bridges, railways, buildings and other structures are worth billions of dollars. Road assets alone are valued at around A$ 140 billion. As the condition of assets deteriorate over time, close to A$10 billion is spent annually in asset maintenance on Australia's roads, or the equivalent of A$27 million per day. To effectively manage road infrastructures, firstly, road agencies need to optimise the expenditure for asset data collection, but at the same time, not jeopardise the reliability in using the optimised data to predict maintenance and rehabilitation costs. Secondly, road agencies need to accurately predict the deterioration rates of infrastructures to reflect local conditions so that the budget estimates could be accurately estimated. And finally, the prediction of budgets for maintenance and rehabilitation must provide a certain degree of reliability. A procedure for assessing investment decision for road asset management has been developed. The procedure includes: • A methodology for optimising asset data collection; • A methodology for calibrating deterioration prediction models; • A methodology for assessing risk-adjusted estimates for life-cycle cost estimates. • A decision framework in the form of risk map
Resumo:
Engineering education is underrepresented in Australia at the primary, middle school and high school levels. Understanding preservice teachers’ preparedness to be involved in engineering will be important for developing an engineering curriculum. This study administered a literature-based survey to 36 preservice teachers, which gathered data about their perceptions of engineering and their predispositions for teaching engineering. Findings indicated that the four constructs associated with the survey had acceptable Cronbach alpha scores (i.e., personal professional attributes .88, student motivation .91, pedagogical knowledge .91, and fused curricula .89). However, there was no “disagree” or “strongly disagree” response greater than 22% for any of the 25 survey items. Generally, these preservice teachers indicated predispositions for teaching engineering in the middle school. Extensive scaffolding and support with education programs will assist preservice teachers to develop confidence in this field. Governments and education departments need to recognise the importance of engineering education, and universities must take a stronger role in developing engineering education curricula.
Resumo:
That Kenneth Frampton has had a significant impact on architectural thinking in Australia was recently demonstrated by his visit, which included two well-attended public lectures and a one-day symposium dedicated to his thinking and writing. Billed as part of the Year of the Built Environment celebrations, these were hosted by the New South Wales chapter of the RAIA, the UNSW Faculty of the Built Environment and the Museum of Contemporary Art. Richard Francis-Jones of FJMT coordinated the symposium, which comprised presentations divided into two sessions, entitled - predictably through no doubt with good intentions - 'Theory' and 'Practice', with four academics and four practitioners in each. Frampton sat to the side throughout, and delivered his own response between them,noting his discomfort in seemingly straddling this divide, as an architect first, then writer and academic, later. Predictably, the familiar Critical Regionalism argument was the mainstay of the day, perhaps the easiest to handle and now almost automatic, despite the fact that Frampton noted when questioned that he hasn't talked much about it in the last 10 years.
Resumo:
Historically, asset management focused primarily on the reliability and maintainability of assets; organisations have since then accepted the notion that a much larger array of processes govern the life and use of an asset. With this, asset management’s new paradigm seeks a holistic, multi-disciplinary approach to the management of physical assets. A growing number of organisations now seek to develop integrated asset management frameworks and bodies of knowledge. This research seeks to complement existing outputs of the mentioned organisations through the development of an asset management ontology. Ontologies define a common vocabulary for both researchers and practitioners who need to share information in a chosen domain. A by-product of ontology development is the realisation of a process architecture, of which there is also no evidence in published literature. To develop the ontology and subsequent asset management process architecture, a standard knowledge-engineering methodology is followed. This involves text analysis, definition and classification of terms and visualisation through an appropriate tool (in this case, the Protégé application was used). The result of this research is the first attempt at developing an asset management ontology and process architecture.
Resumo:
"This book investigates the origins and implications of the securitization crisis, described by the chief executive of ANZ as a "financial services bloodbath". Based on extensive interviews it offers an integrated series of case studies drawn from the United States, the United Kingdom and Australia. A central purpose is to not only chart what went wrong with the investment houses and why the regulatory systems failed, but also provide policy guidance. The book therefore combines the empirical with the normative. In so doing, it provides a route map to navigate one of the most significant financial and regulatory failures in modern times."
Resumo:
Between the 22nd and the 26th of March 2006, Barcelona hosted the 4th Biennal Europea de Paisatge (European Biennial of Landscape Architecture). It comprised a day of presentations for the Rosa Barba Prize for European Landscape Architecture, a day long symposium, and a half day discussion on IBA park projects. Approximately 300 people attended, including sizable groups from Barcelona, France, The Netherlands, Denmark, and Germany. Only three participants from English speaking countries were present, despite simultaneous translation into English throughout.
Resumo:
In this paper we discuss our current efforts to develop and implement an exploratory, discovery mode assessment item into the total learning and assessment profile for a target group of about 100 second level engineering mathematics students. The assessment item under development is composed of 2 parts, namely, a set of "pre-lab" homework problems (which focus on relevant prior mathematical knowledge, concepts and skills), and complementary computing laboratory exercises which are undertaken within a fixed (1 hour) time frame. In particular, the computing exercises exploit the algebraic manipulation and visualisation capabilities of the symbolic algebra package MAPLE, with the aim of promoting understanding of certain mathematical concepts and skills via visual and intuitive reasoning, rather than a formal or rigorous approach. The assessment task we are developing is aimed at providing students with a significant learning experience, in addition to providing feedback on their individual knowledge and skills. To this end, a noteworthy feature of the scheme is that marks awarded for the laboratory work are primarily based on the extent to which reflective, critical thinking is demonstrated, rather than the amount of CBE-style tasks completed by the student within the allowed time. With regard to student learning outcomes, a novel and potentially critical feature of our scheme is that the assessment task is designed to be intimately linked to the overall course content, in that it aims to introduce important concepts and skills (via individual student exploration) which will be revisited somewhat later in the pedagogically more restrictive formal lecture component of the course (typically a large group plenary format). Furthermore, the time delay involved, or "incubation period", is also a deliberate design feature: it is intended to allow students the opportunity to undergo potentially important internal re-adjustments in their understanding, before being exposed to lectures on related course content which are invariably delivered in a more condensed, formal and mathematically rigorous manner. In our presentation, we will discuss in more detail our motivation and rationale for trailing such a scheme for the targeted student group. Some of the advantages and disadvantages of our approach (as we perceived them at the initial stages) will also be enumerated. In a companion paper, the theoretical framework for our approach will be more fully elaborated, and measures of student learning outcomes (as obtained from eg. student provided feedback) will be discussed.