942 resultados para Restricted access material
Resumo:
Clay minerals are examined in detail in the sediment from the Tonga Trench margin at Site 841 (Leg 135 ODP). The changes in amount and nature of secondary clays with depth provide an alternative explanation for the intensive alteration of volcanogenic material at convergent margins. A characteristic distribution of clay minerals with depth shows four distinct zones unexplainable by simple burial diagenesis processes. These are named the upper, reactive, lower and rhyolitic zones. The reactive zone is intercalated with numerous sills and is characterized by the dominant iron-rich clays such as saponite, corrensite and chlorite associated with analcime. The occurrence of such iron-rich clays, mostly associated with a large amount of analcime, yields chemical and mineralogical evidence for thermal diagenesis. The required heat for the diagenetic process was transferred from recently intruded basaltic andesite sills. In the vicinity of these intrusions, the iron-rich clay minerals may have formed at temperatures up to 200°C. A zoning with respect to clay and zeolite minerals indicates that the influence of the palaeoheat flow decreased with the distance from the intrusion. The formation of interlayered I/S, illite, kaolinite and aluminous chlorite, which are recognized as major secondary minerals within the rhyolitic complex, was mainly controlled by both early diagenesis at moderately elevated temperatures, and since the Eocene by burial diagenesis at low temperatures. The occurrence of a steam zone in an early stage of the intrusion is restricted to Miocene tuffs and has overprinted the early alteration of the volcanogenic material within the tuffs and has changed the originally pristine composition of the pore fluids.
Resumo:
Disbound Original Held in Oak Street Library Facility.
Resumo:
"GAO-02-339."
Resumo:
Particulate solids are complex redundant systems which consist of discrete particles. The interactions between the particles are complex and have been the subject of many theoretical and experimental investigations. Invetigations of particulate material have been restricted by the lack of quantitative information on the mechanisms occurring within an assembly. Laboratory experimentation is limited as information on the internal behaviour can only be inferred from measurements on the assembly boundary, or the use of intrusive measuring devices. In addition comparisons between test data are uncertain due to the difficulty in reproducing exact replicas of physical systems. Nevertheless, theoretical and technological advances require more detailed material information. However, numerical simulation affords access to information on every particle and hence the micro-mechanical behaviour within an assembly, and can replicate desired systems. To use a computer program to numerically simulate material behaviour accurately it is necessary to incorporte realistic interaction laws. This research programme used the finite difference simulation program `BALL', developed by Cundall (1971), which employed linear spring force-displacement laws. It was thus necessary to incorporate more realistic interaction laws. Therefore, this research programme was primarily concerned with the implementation of the normal force-displacement law of Hertz (1882) and the tangential force-displacement laws of Mindlin and Deresiewicz (1953). Within this thesis the contact mechanics theories employed in the program are developed and the adaptations which were necessary to incorporate these laws are detailed. Verification of the new contact force-displacement laws was achieved by simulating a quasi-static oblique contact and single particle oblique impact. Applications of the program to the simulation of large assemblies of particles is given, and the problems in undertaking quasi-static shear tests along with the results from two successful shear tests are described.
Resumo:
The paleo-oceanography of the southeastern North Atlantic Ocean during the last 150,000 yr has been studied using biogenous and terrigenous components of hemipelagic sediments sampled close to the northwest African continental margin. Variations of oxygen isotope ratios in shells of benthic calcareous foraminifers in two cores allow the assignment of absolute ages to these cores (in the best case at 1000 yr increments). The uncorrected bulk sedimentation rates of the longest core range from 3.4 to 7.6 cm/ 1000 yr during Interglacial conditions, and from 6.5 to 9.9 cm/1000 yr during Glacial conditions; all other cores have given results of the same order of magnitude, but with generally increasing values towards the continental edge. The distribution of sediment components allow us to make inferences about paleo-oceanographic changes in this region. Frequencies of biogenic components from benthic organisms, oxygen isotope ratios measured in benthic calcareous foraminiferal shells, the total carbonate contents of the sediment and distributions of biogenic components from planktonic organisms often fluctuate in concert. However, all fluctuations which can be attributed to changes of the bottom water masses (North Atlantic Deep Water) seem to precede by several thousand years those which can be linked to changes of the surface water mass distributions or to changes of the climate over the neighboring land masses. Late Quaternary planktonic foraminiferal assemblages in the cores from the northwest African continental margin can be defined satisfactorily in the way that distributions of assemblages found in sediment surface samples from the northeast Atlantic Ocean have been explained. The distributions of assemblages in the northwest African cores can also be used to estimate past sea surface temperatures and salinities. The downcore record of these estimates reveals two warm periods during the last 150,000 yr, the lower one corresponding to the oxygen isotope stage 5 e (equivalent to the Eemian proper in Europe), the upper one to the younger half of the Holocene. Winter surface water temperatures during oxygen isotope stages 6, 4, 3, and 2 are remarkably constant in most cores, while summer sea surface temperatures during stage 3 reach values comparable to those of the warm periods during the Late Holocene and Eemian. Estimated winter sea surface temperatures range from > 16 °C to < 11°C, the summer sea surface temperatures from > 22 °C to < 15 °C during the last 150,000 yr. Estimates of the winter sea surface salinities fluctuate between 36.6? and 35.5?, the higher values being restricted to the warm periods since the penultimate Glacial. Estimates for sea surface temperatures and salinities for two cores from the center of today's coastal upwelling region show less pronounced fluctuations than the record of the open ocean cores in the case of the station 12379 off Cape Barbas, more pronounced in the case of station 12328 off Cape Blanc. Seasonal differences between winter and summer sea surface temperatures derived from the estimated temperatures are today more pronounced in the boundary region of the ocean to the continent than further away from the continent. The differences are generally higher during warm climatic periods of the last 150,000 yr than during cooler ones. The abundance of terrigenous grains in the coarse fractions generally decreases with increasing distance from the continental edge, and also from south to north. The dominant portion of the terrigenous detritus is carried out into the ocean during the relatively cool climatic periods (stage 6, 4, later part of stage 3, stage 2 and oldest part of stage 1). The enhanced precision of dating combined with the stratigraphic resolution of these high deposition rate cores make it clear that the peaks of the terrigenous input off this part of the northwest African continental margin occur simultaneously with times of rapid sea level fluctuations resulting from large volume changes of the large Glacial ice sheets.
Resumo:
The management of main material prices of provincial highway project quota has problems of lag and blindness. Framework of provincial highway project quota data MIS and main material price data warehouse were established based on WEB firstly. Then concrete processes of provincial highway project main material prices were brought forward based on BP neural network algorithmic. After that standard BP algorithmic, additional momentum modify BP network algorithmic, self-adaptive study speed improved BP network algorithmic were compared in predicting highway project main prices. The result indicated that it is feasible to predict highway main material prices using BP NN, and using self-adaptive study speed improved BP network algorithmic is the relatively best one.
Resumo:
International market access for fresh commodities is regulated by international accepted phytosanitary guidelines, the objectives of which are to reduce the biosecurity risk of plant pest and disease movement. Papua New Guinea (PNG) has identified banana as a potential export crop and to help meet international market access requirements, this thesis provides information for the development of a pest risk analysis (PRA) for PNG banana fruit. The PRA is a three step process which first identifies the pests associated with a particular commodity or pathway, then assesses the risk associated with those pests, and finally identifies risk management options for those pests if required. As the first step of the PRA process, I collated a definitive list on the organisms associated with the banana plant in PNG using formal literature, structured interviews with local experts, grey literature and unpublished file material held in PNG field research stations. I identified 112 organisms (invertebrates, vertebrate, pathogens and weeds) associated with banana in PNG, but only 14 of these were reported as commonly requiring management. For these 14 I present detailed information summaries on their known biology and pest impact. A major finding of the review was that of the 14 identified key pests, some research information occurs for 13. The single exception for which information was found to be lacking was Bactrocera musae (Tryon), the banana fly. The lack of information for this widely reported ‘major pest on PNG bananas’ would hinder the development of a PNG banana fruit PRA. For this reason the remainder of the thesis focused on this organism, particularly with respect to generation of information required by the PRA process. Utilising an existing, but previously unanalysed fruit fly trapping database for PNG, I carried out a Geographic Information System analysis of the distribution and abundance of banana in four major regions of PNG. This information is required for a PRA to determine if banana fruit grown in different parts of the country are at different risks from the fly. Results showed that the fly was widespread in all cropping regions and that temperature and rainfall were not significantly correlated with banana fly abundance. Abundance of the fly was significantly correlated (albeit weakly) with host availability. The same analysis was done with four other PNG pest fruit flies and their responses to the environmental factors differed to banana fly and each other. This implies that subsequent PRA analyses for other PNG fresh commodities will need to investigate the risk of each of these flies independently. To quantify the damage to banana fruit caused by banana fly in PNG, local surveys and one national survey of banana fruit infestation were carried out. Contrary to expectations, infestation was found to be very low, particularly in the widely grown commercial cultivar, Cavendish. Infestation of Cavendish fingers was only 0.41% in a structured, national survey of over 2 700 banana fingers. Follow up laboratory studies showed that fingers of Cavendish, and another commercial variety Lady-finger, are very poor hosts for B. musae, with very low host selection rates by female flies and very poor immature survival. An analysis of a recent (within last decade) incursion of B. musae into the Gazelle Peninsula of East New Britain Province, PNG, provided the final set of B. musae data. Surveys of the fly on the peninsular showed that establishment and spread of the fly in the novel environment was very rapid and thus the fly should be regarded as being of high biosecurity concern, at least in tropical areas. Supporting the earlier impact studies, however, banana fly has not become a significant banana fruit problem on the Gazelle, despite bananas being the primary starch staple of the region. The results of the research chapters are combined in the final Discussion in the form of a B. musae focused PRA for PNG banana fruit. Putting the thesis in a broader context, the Discussion also deals with the apparent discrepancy between high local abundance of banana fly and very low infestation rates. This discussion focuses on host utilisation patterns of specialist herbivores and suggests that local pest abundance, as determined by trapping or monitoring, need not be good surrogate for crop damage, despite this linkage being implicit in a number of international phytosanitary protocols.
Resumo:
On the back of the growing capacity of networked digital information technologies to process and visualise large amounts of information in a timely, efficient and user-driven manner we have seen an increasing demand for better access to and re-use of public sector information (PSI). The story is not a new one. Share knowledge and together we can do great things; limit access and we reduce the potential for opportunity. The two volumes of this book seek to explain and analyse this global shift in the way we manage public sector information. In doing so they collect and present papers, reports and submissions on the topic by leading authors and institutions from across the world. These in turn provide people tasked with mapping out and implementing information policy with reference material and practical guidance. Volume 1 draws together papers on the topic by policymakers, academics and practitioners while Volume 2 presents a selection of the key reports and submissions that have been published over the last few years.
Resumo:
This chapter provides an account of the use of Creative Commons (CC) licensing as a legally and operationally effective means by which governments can implement systems to enable open access to and reuse of their public sector information (PSI). It describes the experience of governments in Australia in applying CC licences to PSI in a context where a vast range of material and information produced, collected, commissioned of funded by government is subject to copyright. By applying CC licences, governments can give effect to their open access policies and create a public domain of PSI which is available for resue by other governmental agencies and the community at large.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
In open railway access markets, a train service provider (TSP) negotiates with an infrastructure provider (IP) for track access rights. This negotiation has been modeled by a multi-agent system (MAS) in which the IP and TSP are represented by separate software agents. One task of the IP agent is to generate feasible (and preferably optimal) track access rights, subject to the constraints submitted by the TSP agent. This paper formulates an IP-TSP transaction and proposes a branch-and-bound algorithm for the IP agent to identify the optimal track access rights. Empirical simulation results show that the model is able to emulate rational agent behaviors. The simulation results also show good consistency between timetables attained from the proposed methods and those derived by the scheduling principles adopted in practice.
Resumo:
The Malaysian National Innovation Model blueprint states that there is an urgent need to pursue an innovation-oriented economy to improve the nation’s capacity for knowledge, creativity and innovation. In nurturing a pervasive innovation culture, the Malaysian government has declared the year 2010 as an Innovative Year whereby creativity among its population is highly celebrated. However, while Malaysian citizens are encouraged to be creative and innovative, scientific data and information generated from publicly funded research in Malaysia is locked up because of rigid intellectual property licensing regimes and traditional publishing models. Reflecting on these circumstances, this paper looks at, and argue why, scientific data and information should be made available, accessible and re-useable freely to promote the grassroots level of innovation in Malaysia. Using innovation theory as its platform of argument, this paper calls for an open access policy for publicly funded research output to be adopted and implemented in Malaysia. Simultaneously, a normative analytic approach is used to determine the types of open access policy that ought to be adopted to spur greater innovation among Malaysians.
Resumo:
This thesis examines the role of government as proprietor, preserver and user of copyright material under the Copyright Act 1968 (Cth) and the policy considerations which Australian law should take into account in that role. There are two recurring themes arising in this examination which are significant to the recommendations and conclusions. The first is whether the needs and status of government should be different from private sector institutions, which also obtain copyright protection under the law. This theme stems from the 2005 Report on Crown Copyright by the Copyright Law Review Committee and the earlier Ergas Committee Report which are discussed in Chapters 2 and 8 of this thesis. The second is to identify the relationship between government copyright law and policy, national cultural policy and fundamental governance values. This theme goes to the essence of the thesis. For example, does the law and practice of government copyright properly reflect technological change in the way we now access and use information and does it facilitate the modern information management principles of government? Is the law and practice of government copyright consistent with the greater openness and accountability of government? The thesis concludes that government copyright law and practice in each of the three governmental roles recognised under the Copyright Act 1968 has not responded adequately to the information age and to the desire and the ability of individuals to access information quickly and effectively. The solution offered in this thesis is reform of the law and of public policy that is in step with access to information policy, the promotion of better communication and interaction with the community, and the enhanced preservation of government and private copyright materials for reasons of government accountability, effective administration and national culture and heritage.