1000 resultados para Evaporation source


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis was a step forward in predicting the levels and sources of polycyclic aromatic hydrocarbons (PAHs) in sediments of Brisbane river, especially after the Brisbane floods in 2011. It employed different statistical techniques to provide valuable information that may assist source control and formulation of pollution mitigation measures for the river.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Providing an incentive is becoming common practice among blood service organisations. Driven by self-orientated motives rather than pure philanthropic intentions, research is showing that people increasingly want something in return for their support. It is contended that individuals donate conspicuously with the hope it will improve their social standing. Yet there is limited evidence for the effectiveness of conspicuous recognition strategies, and no studies, to the researcher’s knowledge, that have examined conspicuous donation strategies in an online social media context. There is a need to understand what value drives individuals to donate blood, and whether conspicuous donation strategies are a source of such value post blood donation. The purpose of this paper is to conceptualise how conspicuous donation strategies, in the form of virtual badges on social media sites, can be applied to the social behaviour of blood donation, as a value-adding tool, to encourage repeat behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the existence of air quality guidelines in Australia and New Zealand, the concentrations of particulate matter have exceeded these guidelines on several occasions. To identify the sources of particulate matter, examine the contributions of the sources to the air quality at specific areas and estimate the most likely locations of the sources, a growing number of source apportionment studies have been conducted. This paper provides an overview of the locations of the studies, salient features of the results obtained and offers some perspectives for the improvement of future receptor modelling of air quality in these countries. The review revealed that because of its advantages over alternative models, Positive Matrix Factorisation (PMF) was the most commonly applied model in the studies. Although there were differences in the sources identified in the studies, some general trends were observed. While biomass burning was a common problem in both countries, the characteristics of this source varied from one location to another. In New Zealand, domestic heating was the highest contributor to particle levels on days when the guidelines were exceeded. On the other hand, forest back-burning was a concern in Brisbane while marine aerosol was a major source in most studies. Secondary sulphate, traffic emissions, industrial emissions and re-suspended soil were also identified as important sources. Some unique species, for example, volatile organic compounds and particle size distribution were incorporated into some of the studies with results that have significant ramifications for the improvement of air quality. Overall, the application of source apportionment models provided useful information that can assist the design of epidemiological studies and refine air pollution reduction strategies in Australia and New Zealand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human and ecosystem health impacts imposed by water pollution are a major problem in the urban areas of Sri Lanka. A primary source of pollutants to urban water sources is atmospheric particles. Hence, it is important to develop a detailed understanding of atmospheric particle characteristics, their sources of origin and the transport pathways. Several research studies have been conducted in Sri Lanka on atmospheric pollution and these studies have tended to differ in their scope, study region and the investigated pollutants. The objectives of this paper are: (1) to report the outcomes of a detailed state-of-art literature review of atmospheric pollution related studies in Sri Lanka to understand the current trends and (2) to discuss the future research activities necessary to generate the important knowledge required for the development of effective strategies to control the adverse impacts of atmospheric pollution on urban waterways.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the design of μAV, a palm size open source micro quadrotor constructed on a single Printed Circuit Board. The aim of the micro quadrotor is to provide a lightweight (approximately 86g) and cheap robotic research platform that can be used for a range of robotic applications. One possible application could be a cheap test bed for robotic swarm research. The goal of this paper is to give an overview of the design and capabilities of the micro quadrotor. The micro quadrotor is complete with a 9 Degree of Freedom Inertial Measurement Unit, a Gumstix Overo® Computer-On-Module which can run the widely used Robot Operating System (ROS) for use with other research algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Mycobacterium abscessus is a rapidly growing mycobacterium responsible for progressive pulmonary disease, soft tissue and wound infections. The incidence of disease due to M. abscessus has been increasing in Queensland. In a study of Brisbane drinking water, M. abscessus was isolated from ten different locations. The aim of this study was to compare genotypically the M. abscessus isolates obtained from water to those obtained from human clinical specimens. Methods Between 2007 and 2009, eleven isolates confirmed as M. abscessus were recovered from potable water, one strain was isolated from a rainwater tank and another from a swimming pool and two from domestic taps. Seventy-four clinical isolates referred during the same time period were available for comparison using rep-PCR strain typing (Diversilab). Results The drinking water isolates formed two clusters with ≥97% genetic similarity (Water patterns 1 and 2). The tankwater isolate (WP4), one municipal water isolate (WP3) and the pool isolate (WP5) were distinctly different. Patient isolates formed clusters with all of the water isolates except for WP3. Further patient isolates were unrelated to the water isolates. Conclusion The high degree of similarity between strains of M. abscessus from potable water and strains causing infection in humans from the same geographical area, strengthens the possibility that drinking water may be the source of infection in these patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

M. fortuitum is a rapidly growing mycobacterium associated with community-acquired and nosocomial wound, soft tissue, and pulmonary infections. It has been postulated that water has been the source of infection especially in the hospital setting. The aim of this study was to determine if municipal water may be the source of community-acquired or nosocomial infections in the Brisbane area. Between 2007 and 2009, 20 strains of M. fortuitum were recovered from municipal water and 53 patients’ isolates were submitted to the reference laboratory. A wide variation in strain types was identified using repetitive element sequence-based PCR, with 13 clusters of ≥2 indistinguishable isolates, and 28 patterns consisting of individual isolates. The clusters could be grouped into seven similar groups (>95% similarity). Municipal water and clinical isolates collected during the same time period and from the same geographical area consisted of different strain types, making municipal water an unlikely source of sporadic human infection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The wind field of an intense idealised downburst wind storm has been studied using an axisymmetric, dry, non-hydrostatic numerical sub-cloud model. The downburst driving processes of evaporation and melting have been paramaterized by an imposed cooling source that triggers and sustains a downdraft. The simulated downburst exhibits many characteristics of observed full-scale downburst events, in particular the presence of a primary and counter rotating secondary ring vortex at the leading edge of the diverging front. The counter-rotating vortex is shown to significantly influence the development and structure of the outflow. Numerical forcing and environmental characteristics have been systematically varied to determine the influence on the outflow wind field. Normalised wind structure at the time of peak outflow intensity was generally shown to remain constant for all simulations. Enveloped velocity profiles considering the velocity structure throughout the entire storm event show much more scatter. Assessing the available kinetic energy within each simulated storm event, it is shown that the simulated downburst wind events had significantly less energy available for loading isolated structures when compared with atmospheric boundary layer winds. The discrepancy is shown to be particularly prevalent when wind speeds were integrated over heights representative of tall buildings. A similar analysis for available full scale measurements led to similar findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this Article, Petia Wohed, Arthur H. M. ter Hofstede, Nick Russell, Birger Andersson, and Wil M. P. van der Aalst present the results of their examination of existing open source BPM systems. Their conclusions are illuminating for both Open Source developers as well as the user community. Read their Article for the details of their study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several significant studies have been made in recent decades toward understanding road traffic noise and its effects on residential balconies. These previous studies have used a variety of techniques such as theoretical models, scale models and measurements on real balconies. The studies have considered either road traffic noise levels within the balcony space or inside an adjacent habitable room or both. Previous theoretical models have used, for example, simplified specular reflection calculations, boundary element methods (BEM), adaptations of CoRTN or the use of Sabine Theory. This paper presents an alternative theoretical model to predict the effects of road traffic noise spatially within the balcony space. The model includes a specular reflection component by calculating up to 10 orders of source images. To account for diffusion effects, a two compartment radiosity component is utilised. The first radiosity compartment is the urban street, represented as a street with building facades on either side. The second radiosity compartment is the balcony space. The model is designed to calculate the predicted road traffic noise levels within the balcony space and is capable of establishing the effect of changing street and balcony geometries. Screening attenuation algorithms are included to determine the effects of solid balcony parapets and balcony ceiling shields.