922 resultados para Profiling Sonar


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Retrieval, treatment, and disposal of high-level radioactive waste (HLW) is expected to cost between 100 and 300 billion dollars. The risk to workers, public health, and the environment are also a major area of concern for HLW. Visualization of the interface between settled solids and the optically opaque liquid is needed for retrieval of the waste from underground storage tanks. A Profiling sonar selected for this research generates 2-D image of the interface. Multiple experiments were performed to demonstrate the effectiveness of sonar in real-time monitoring the interface inside HLW tanks. First set of experiments demonstrated that objects shapes could be identified even when 30% of solids entrained in liquid, thereby mapping the interface. Simulation of sonar system validated these results. Second set of experiments confirmed the sonar’s ability in detecting the solids with density similar to the immersed liquid. Third set of experiments determined the affects of near by objects on image resolution. Final set of experiments proved the functional and chemical capabilities of sonar in caustic solution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is a need to obtain the hydrologic data including ocean current, wave, temperature and so on in the South China Sea. A new profiling instrument which does not suffer from the damage due to nature forces or incidents caused by passing ships, is under development to acquire data from this area. This device is based on a taut single point mid-water mooring system. It incorporates a small, instrumented vertically profiling float attached via an electromechanical cable to a winch integral with the main subsurface flotation. On a pre-set schedule, the instrument float with sensors is winched up to the surface if there is no strip passing by, which is defined by an on-board miniature sonar. And it can be immediately winched down to a certain depth if the sonar sensor finds something is coming. Since, because Of logistics, the area can only be visited once for a long time and a minimum of 10 times per day profiles are desired, energy demands are severe. To respond to these concerns, the system has been designed to conserve a substantial portion of the potential energy lost during the ascent phase of each profile and subsequently use this energy to pull the instrument down. Compared with the previous single-point layered measuring mode, it is advanced and economical. At last the paper introduces the test in the South China Sea.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The measurement of ICT (information and communication technology) integration is emerging as an area of research interest with such systems as Education Queensland including it in their recently released list of research priorities. Studies to trial differing integration measurement instruments have taken place within Australia in the last few years, particularly Western Australia (Trinidad, Clarkson, & Newhouse, 2004; Trinidad, Newhouse & Clarkson, 2005), Tasmania (Fitzallen 2005) and Queensland (Finger, Proctor, & Watson, 2005). This paper will add to these investigations by describing an alternate and original methodological approach which was trialled in a small-scale pilot study conducted jointly by Queensland Catholic Education Commission (QCEC) and the Centre of Learning Innovation, Queensland University of Technology (QUT) in late 2005. The methodology described is based on tasks which, through a process of profiling, can be seen to be artefacts which embody the internal and external factors enabling and constraining ICT integration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer forensics is the process of gathering and analysing evidence from computer systems to aid in the investigation of a crime. Typically, such investigations are undertaken by human forensic examiners using purpose-built software to discover evidence from a computer disk. This process is a manual one, and the time it takes for a forensic examiner to conduct such an investigation is proportional to the storage capacity of the computer's disk drives. The heterogeneity and complexity of various data formats stored on modern computer systems compounds the problems posed by the sheer volume of data. The decision to undertake a computer forensic examination of a computer system is a decision to commit significant quantities of a human examiner's time. Where there is no prior knowledge of the information contained on a computer system, this commitment of time and energy occurs with little idea of the potential benefit to the investigation. The key contribution of this research is the design and development of an automated process to describe a computer system and its activity for the purposes of a computer forensic investigation. The term proposed for this process is computer profiling. A model of a computer system and its activity has been developed over the course of this research. Using this model a computer system, which is the subj ect of investigation, can be automatically described in terms useful to a forensic investigator. The computer profiling process IS resilient to attempts to disguise malicious computer activity. This resilience is achieved by detecting inconsistencies in the information used to infer the apparent activity of the computer. The practicality of the computer profiling process has been demonstrated by a proof-of concept software implementation. The model and the prototype implementation utilising the model were tested with data from real computer systems. The resilience of the process to attempts to disguise malicious activity has also been demonstrated with practical experiments conducted with the same prototype software implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the use of models in automatic computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships. These together provide the information necessary for a human investigator or an automated reasoning engine to make judgements as to the probable usage and evidentiary value of a computer system. The computer profiling object model can be implemented so as to support automated analysis to provide an investigator with the information needed to decide whether manual analysis is required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer profiling is the automated forensic examination of a computer system in order to provide a human investigator with a characterisation of the activities that have taken place on that system. As part of this process, the logical components of the computer system – components such as users, files and applications - are enumerated and the relationships between them discovered and reported. This information is enriched with traces of historical activity drawn from system logs and from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work examines the impact of temporal inconsistency in such information and discusses two types of temporal inconsistency that may arise – inconsistency arising out of the normal errant behaviour of a computer system, and inconsistency arising out of deliberate tampering by a suspect – and techniques for dealing with inconsistencies of the latter kind. We examine the impact of deliberate tampering through experiments conducted with prototype computer profiling software. Based on the results of these experiments, we discuss techniques which can be employed in computer profiling to deal with such temporal inconsistencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conifers are resistant to attack from a large number of potential herbivores or pathogens. Previous molecular and biochemical characterization of selected conifer defence systems support a model of multigenic, constitutive and induced defences that act on invading insects via physical, chemical, biochemical or ecological (multitrophic) mechanisms. However, the genomic foundation of the complex defence and resistance mechanisms of conifers is largely unknown. As part of a genomics strategy to characterize inducible defences and possible resistance mechanisms of conifers against insect herbivory, we developed a cDNA microarray building upon a new spruce (Picea spp.) expressed sequence tag resource. This first-generation spruce cDNA microarray contains 9720 cDNA elements representing c. 5500 unique genes. We used this array to monitor gene expression in Sitka spruce (Picea sitchensis) bark in response to herbivory by white pine weevils (Pissodes strobi, Curculionidae) or wounding, and in young shoot tips in response to western spruce budworm (Choristoneura occidentalis, Lepidopterae) feeding. Weevils are stem-boring insects that feed on phloem, while budworms are foliage feeding larvae that consume needles and young shoot tips. Both insect species and wounding treatment caused substantial changes of the host plant transcriptome detected in each case by differential gene expression of several thousand array elements at 1 or 2 d after the onset of treatment. Overall, there was considerable overlap among differentially expressed gene sets from these three stress treatments. Functional classification of the induced transcripts revealed genes with roles in general plant defence, octadecanoid and ethylene signalling, transport, secondary metabolism, and transcriptional regulation. Several genes involved in primary metabolic processes such as photosynthesis were down-regulated upon insect feeding or wounding, fitting with the concept of dynamic resource allocation in plant defence. Refined expression analysis using gene-specific primers and real-time PCR for selected transcripts was in agreement with microarray results for most genes tested. This study provides the first large-scale survey of insect-induced defence transcripts in a gymnosperm and provides a platform for functional investigation of plant-insect interactions in spruce. Induction of spruce genes of octadecanoid and ethylene signalling, terpenoid biosynthesis, and phenolic secondary metabolism are discussed in more detail.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective people management is essential to successful innovation, however no single human resource function or practice can facilitate the development of innovation capacity in an organization. Several studies have argued that different bundles or configurations of human resource practices can improve innovation performance, but there is little empirically based research that provides details of the practices utilized by different types of innovative firms. In this exploratory, qualitative study of innovative Danish firms we examine the profiles of human resource practices evident in a sample of firms recognized for their innovative performance. In examining these profiles, we analyze how characteristics of the organizations, namely their size and the nature of industry specific core capabilities, influence the human resource practices used to support innovation. Our initial findings indicate that in this sample of firms size is not a factor but knowledge-intensive firms have notably different profiles of human resource practices to technology-based firms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agile ridesharing aims to utilise the capability of social networks and mobile phones to facilitate people to share vehicles and travel in real time. However the application of social networking technologies in local communities to address issues of personal transport faces significant design challenges. In this paper we describe an iterative design-based approach to exploring this problem and discuss findings from the use of an early prototype. The findings focus upon interaction, privacy and profiling. Our early results suggest that explicitly entering information such as ride data and personal profile data into formal fields for explicit computation of matches, as is done in many systems, may not be the best strategy. It might be preferable to support informal communication and negotiation with text search techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While unlicensed driving does not play a direct causative role in road crashes, it represents a major problem for road safety. A particular subgroup of concern is those offenders who continue to drive after having their licence disqualified for drink driving. Surveys of disqualified drivers suggest that driving among this group is relatively common. Method This paper reports findings from an analysis of the driving records of over 545,000 Queensland drivers who experienced a licence sanction between January 2003 and December 2008. The sample included drivers who were disqualified by a court (e.g., for drink driving); those who licence had been suspended administratively (e.g., for accumulation of demerit points); and those who were placed on a restricted licence. Results Overall, 95,461 of the drivers in the sample were disqualified from driving for a drink driving offence. During the period, these drivers were issued with a total of 2,644,619 traffic infringements with approximately 12% (n = 8, 095) convicted of a further drink driving offence while disqualified. Other traffic offences detected during this period including unlicensed driving (18%), driving an unregistered vehicle (27%), speeding (21%), dangerous driving (36%), mobile phone use (35%), non-restraint use (32%), and other moving violation (23%). Offending behaviour was more common among men than women. Conclusions While licence disqualification has previously been shown to be a relatively effective sanction for managing the behaviour of drink driving offenders, the results of the current study highlight that it is a far from perfect tool since many offenders continue to commit both drink driving and other traffic offences while disqualified. As such, this study highlights the ongoing need to enhance the detection of disqualified and unlicensed driving in order to deter this behaviour.