Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1351 - 1380 of 2936

Full-Text Articles in Social and Behavioral Sciences

Assessing The Influence Of Climatic Variables On Electricity Demand, Dao Hoang Vu, Kashem M. Muttaqi, Ashish P. Agalgaonkar Jan 2014

Assessing The Influence Of Climatic Variables On Electricity Demand, Dao Hoang Vu, Kashem M. Muttaqi, Ashish P. Agalgaonkar

Faculty of Engineering and Information Sciences - Papers: Part A

The electricity demand is significantly dependent on the weather information. Such weather information is comprised of different climatic variables such as temperature, humidity, wind speed, evaporation, rain fall and solar exposure which constantly change. Therefore, analysing the impacts of these variables on demand is necessary for predicting the future change in demand. In this paper, the cooling and heating degree days are utilised to capture the relationship between the per capita demand to temperature, which is one of the key climatic variables. In addition, Pearson correlation analysis has been employed to investigate the interdependency between different climatic variables and electricity …


Multi-Objective Ant Colony System For Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Junzhou Luo Jan 2014

Multi-Objective Ant Colony System For Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Junzhou Luo

Faculty of Engineering and Information Sciences - Papers: Part A

Data-intensive services have become one of the most challenging applications in cloud computing. The classical service composition problem will face new challenges as the services and correspondent data grow. A typical environment is the large scale scientific project AMS, which we are processing huge amount of data streams. In this paper, we will resolve service composition problem by considering the multi-objective data-intensive features. We propose to apply ant colony optimization algorithms and implemented them with simulated workflows in different scenarios. To evaluate the proposed algorithm, we compared it with a multi-objective genetic algorithm with respect to five performance metrics


Influence Of Polarization And A Source Model For Dose Calculation In Mrt, Stefan Bartzsch, Michael Lerch, Marco Petasecca, Elke Brauer-Krisch, Uwe Oelfke Jan 2014

Influence Of Polarization And A Source Model For Dose Calculation In Mrt, Stefan Bartzsch, Michael Lerch, Marco Petasecca, Elke Brauer-Krisch, Uwe Oelfke

Faculty of Engineering and Information Sciences - Papers: Part A

Purpose: Microbeam Radiation Therapy (MRT), an alternative preclinical treatment strategy using spatially modulated synchrotron radiation on a micrometer scale, has the great potential to cure malignant tumors (e.g., brain tumors) while having low side effects on normal tissue. Dose measurement and calculation in MRT is challenging because of the spatial accuracy required and the arising high dose differences. Dose calculation with Monte Carlo simulations is time consuming and their accuracy is still a matter of debate. In particular, the influence of photon polarization has been discussed in the literature. Moreover, it is controversial whether a complete knowledge of phase space …


Mitigation Of Landslide Impacts, Strategies And Challenges For The 21st Century, Robin Chowdhury, Phil Flentje Jan 2014

Mitigation Of Landslide Impacts, Strategies And Challenges For The 21st Century, Robin Chowdhury, Phil Flentje

Faculty of Engineering and Information Sciences - Papers: Part A

Reliable methods for mitigation of landslide impacts must be based on the latest developments in knowledge and advanced methods of analysis and synthesis. An interdisciplinary approach is essential for effective solutions to landslide problems. Prevention or mitigation of landslide disasters requires understanding the factors which often lead to catastrophic landsliding and the simulation of conditions under which such failures may occur. The analysis of rainfall-triggered landsliding in saturated soils requires a proper understanding of how the factor of safety decreases with increase in pore water pressure. On the other hand, for landsliding in unsaturated soils it is necessary to understand …


Time Spent On Daytime Direct Care Activities By Personal Carers In Two Australian Residential Aged Care Facilities: A Time-Motion Study, Siyu Qian, Ping Yu, David M. Hailey, Zhenyu Zhang, Pam Davy, Mark I. Nelson Jan 2014

Time Spent On Daytime Direct Care Activities By Personal Carers In Two Australian Residential Aged Care Facilities: A Time-Motion Study, Siyu Qian, Ping Yu, David M. Hailey, Zhenyu Zhang, Pam Davy, Mark I. Nelson

Faculty of Engineering and Information Sciences - Papers: Part A

Objective. To examine the time, frequency and duration of each direct care activity conducted by personal carers in Australian residential aged care homes. Methods. A time-motion study was conducted to observe 46 personal carers at two high-care houses in two facilities (14 days at Site 1 and 16 days at Site 2). Twenty-three direct care activities were classified into eight categories for analysis. Results. Overall, a personal carer spent approximately 45% of their time on direct care, corresponding to 3.5 h in an 8-h daytime shift. The two sites had similar ratios of personal carers to residents, and each resident …


Commissioning Of Shareplan: The Liverpool Experience, Aitang Xing, Shrikant Deshpande, Sankar Arumugam, A George, Lois C. Holloway, Gary Goozee Jan 2014

Commissioning Of Shareplan: The Liverpool Experience, Aitang Xing, Shrikant Deshpande, Sankar Arumugam, A George, Lois C. Holloway, Gary Goozee

Faculty of Engineering and Information Sciences - Papers: Part A

SharePlan is a treatment planning system developed by Raysearch Laboratories AB to enable creation of a linear accelerator intensity modulated radiotherapy (IMRT) plan as a backup for a Tomotherapy plan. A 6MV Elekta Synergy Linear accelerator photon beam was modelled in SharePlan. The beam model was validated using Matrix Evolution, a 2D ion chamber array, for two head-neck and three prostate plans using 3%/3mm Gamma criteria. For 39 IMRT beams, the minimum and maximum Gamma pass rates are 95.4% and 98.7%. SharePlan is able to generate backup IMRT plans which are deliverable on a traditional linear accelerator and accurate in …


Pycmsxio: An External Interface To Script Treatment Plans For The Elekta® Cms Xio Treatment Planning System, Aitang Xing, Sankar Arumugam, Lois Holloway, Gary Goozee Jan 2014

Pycmsxio: An External Interface To Script Treatment Plans For The Elekta® Cms Xio Treatment Planning System, Aitang Xing, Sankar Arumugam, Lois Holloway, Gary Goozee

Faculty of Engineering and Information Sciences - Papers: Part A

Scripting in radiotherapy treatment planning systems not only simplifies routine planning tasks but can also be used for clinical research. Treatment planning scripting can only be utilized in a system that has a built-in scripting interface. Among the commercially available treatment planning systems, Pinnacle (Philips) and Raystation (Raysearch Lab.) have inherent scripting functionality. CMS XiO (Elekta) is a widely used treatment planning system in radiotherapy centres around the world, but it does not have an interface that allows the user to script radiotherapy plans. In this study an external scripting interface, PyCMSXiO, was developed for XiO using the Python programming …


Negative Ion Chemistry Of Deoxyribose And Thf Upon Potassium Atom Collisions, D Almeida, F. Ferreira Da Silva, G García, P Limao-Vieira Jan 2014

Negative Ion Chemistry Of Deoxyribose And Thf Upon Potassium Atom Collisions, D Almeida, F. Ferreira Da Silva, G García, P Limao-Vieira

Faculty of Engineering and Information Sciences - Papers: Part A

Negative ion formation in collisions of potassium atoms with tetrahydrofuran (THF) and D-Ribose (DR) were performed in a crossed molecular beam setup equipped with a time- of-flight (TOF) mass spectrometer. Owing to the role of these molecules as possible representations of the sugar unit in the DNA/RNA, the fragmentation patterns obtained for different collision energies were compared and the role of K+ post-collision interaction with the molecular is evaluated.


In Situ Micro-Raman Studies Of Laser-Induced Bismuth Oxidation Reveals Metastability Of Beta-Bi2o3 Microislands, J A. Steele, R A. Lewis Jan 2014

In Situ Micro-Raman Studies Of Laser-Induced Bismuth Oxidation Reveals Metastability Of Beta-Bi2o3 Microislands, J A. Steele, R A. Lewis

Faculty of Engineering and Information Sciences - Papers: Part A

We report the laser irradiation-induced oxidation of bismuth metal investigated in situ by micro-Raman spectroscopy as a function of irradiation power and time. The purely optical synthesis and characterization of beta-Bi2O3 oxide microislands on metallic Bi surfaces is shown to be stable over time, even at room-temperature. By closely examining possible reactions on simple Bi morphologies it is revealed for the first time that the ensuing oxide phase is critically dependent on the final oxide volume and follows a fixed kinetic transformation sequence: 3/2 O2(g)+2Bi(l) -> beta-Bi2O3(s) -> alpha-Bi2O3(s). These findings are unusual within the framework of traditional Bi2O3 thermal …


A Structure Optimization Algorithm Of Neural Networks For Large-Scale Data Sets, Jie Yang, Jun Ma, Matthew J. Berryman, Pascal Perez Jan 2014

A Structure Optimization Algorithm Of Neural Networks For Large-Scale Data Sets, Jie Yang, Jun Ma, Matthew J. Berryman, Pascal Perez

Faculty of Engineering and Information Sciences - Papers: Part A

Over the past several decades, neural networks have evolved into powerful computation systems, which are able to learn complex nonlinear input-output relationship from data. However, the structure optimization problem of neural network is a big challenge for processing huge-volumed, diversified and uncertain data. This paper focuses on this problem and introduces a network pruning algorithm based on sparse representation, termed SRP. The proposed approach starts with a large network, then selects important hidden neurons from the original structure using a forward selection criterion that minimizes the residual output error. Furthermore, the presented algorithm has no constraints on the network type. …


Stochastic Modeling And Optimization Of Multi-Plant Capacity Planning Problem, Anoop Verma, Nagesh Shukla, S.K Tyagi, Nishikant Mishra Jan 2014

Stochastic Modeling And Optimization Of Multi-Plant Capacity Planning Problem, Anoop Verma, Nagesh Shukla, S.K Tyagi, Nishikant Mishra

Faculty of Engineering and Information Sciences - Papers: Part A

n this paper the problem of capacity planning under risk from demand and price/cost uncertainty of the finished products is addressed. The deterministic model is extended into a two-stage stochastic model with fixed recourse by means of various expected levels of demand as random. A recourse penalty is also included in the objective for both shortage and surplus in the finished products. The model is analyzed to quantify the risk using Markowitz mean-variance model.


Real-Time Task Attributes And Temporal Constraints, Amir Ashamalla, Ghassan Beydoun, N Paramesh Jan 2014

Real-Time Task Attributes And Temporal Constraints, Amir Ashamalla, Ghassan Beydoun, N Paramesh

Faculty of Engineering and Information Sciences - Papers: Part A

Real-time tasks need attributes for monitoring their execution and performing recovery actions in case of failures. Temporal constraints are a class of real-time task attributes where the constraints relate the status of the task to temporal entities. Violating temporal constraints can produce consequences of unknown severity. This paper is part of our on-going research on real-time multi agent systems constraints. We discuss the importance of temporal constraints and present a task model that explicitly represents temporal constraints. We also present our preliminary results from our initial implementation in the domain of Meeting Schedules Management involving multiple users assisted by agents.


Discriminative Sparse Inverse Covariance Matrix: Application In Brain Functional Network Classification, Luping Zhou, Lei Wang, Philip O. Ogunbona Jan 2014

Discriminative Sparse Inverse Covariance Matrix: Application In Brain Functional Network Classification, Luping Zhou, Lei Wang, Philip O. Ogunbona

Faculty of Engineering and Information Sciences - Papers: Part A

Recent studies show that mental disorders change the functional organization of the brain, which could be investigated via various imaging techniques. Analyzing such changes is becoming critical as it could provide new biomarkers for diagnosing and monitoring the progression of the diseases. Functional connectivity analysis studies the covary activity of neuronal populations in different brain regions. The sparse inverse covariance estimation (SICE), also known as graphical LASSO, is one of the most important tools for functional connectivity analysis, which estimates the interregional partial correlations of the brain. Although being increasingly used for predicting mental disorders, SICE is basically a generative …


Electro-Tactile Feedback System For Achieving Embodiment In A Tele-Operated Robot, Daniel Pamungkas, Koren Ward Jan 2014

Electro-Tactile Feedback System For Achieving Embodiment In A Tele-Operated Robot, Daniel Pamungkas, Koren Ward

Faculty of Engineering and Information Sciences - Papers: Part A

Tele-operation can enable an operator to control a robot remotely in inaccessible and hazardous environments. However, controlling a robot remotely via a conventional monitor and control panel can be difficult and slow. To achieve faster and more dexterous operation of the robot, enhanced 3D perception and some form of tactile or neural feedback is needed to achieve some degree of embodiment within the robot's physical structure and world. To achieve this objective we have devised an immersive tele-operation system comprised of a stereo vision headset and an electro-tactile feedback system that is worn by the operator, connected to stereo cameras …


Estimating The Magnitude Of Method Bias On Account Of Text Similarity Using A Natural Language Processing-Based Technique, Rajeev Sharma, Murad Safadi, Megan Andrews, Philip O. Ogunbona, Jeff Crawford Jan 2014

Estimating The Magnitude Of Method Bias On Account Of Text Similarity Using A Natural Language Processing-Based Technique, Rajeev Sharma, Murad Safadi, Megan Andrews, Philip O. Ogunbona, Jeff Crawford

Faculty of Engineering and Information Sciences - Papers: Part A

A number of potential biases have been identified that may contribute a spurious component to the observed correlation between variables. One such potential bias is the manner in which items are worded. This paper presents a technique and a program of research to estimate the magnitude of method bias arising from item wording. We hypothesize that the greater the level of text similarity between items employed to capture predictor and criterion variables, the greater the magnitude of the observed effect size between them. Two samples will be employed; one investigating the perceived usefulness-use correlations reported in the TAM literature and …


Emerging Of Academic Information Search System With Ontology-Based Approach, Norasykin Mohd Zaid, Sim Kim Lau Jan 2014

Emerging Of Academic Information Search System With Ontology-Based Approach, Norasykin Mohd Zaid, Sim Kim Lau

Faculty of Engineering and Information Sciences - Papers: Part A

This paper describes the comparison of ontology development tools for development of academic information search system that assists inexperienced research students at a local university in Malaysia to search for academic resources in the local language context (Bahasa Malaysia). The cohort of inexperienced research students faces two main problems when using current system comprises of keyword search. Firstly the language barrier-limiting students' capabilities to conduct keyword search in foreign language (such as English). Secondly limited research experience in querying often results in obtaining irrelevant search results. The proposed semantic search system aims to apply ontology-based search to overcome the above …


Collaborative Learning Through Taas: A Mobile System For Courses Over The Cloud, Geng Sun, Jun Shen Jan 2014

Collaborative Learning Through Taas: A Mobile System For Courses Over The Cloud, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

As mobile cloud-based learning gain wide acceptance, learners engaged in online courses have more opportunities to participate in virtual teams. In this paper we present a new system, Teamwork as a Service (TaaS), which is service-oriented and emphasizes on building a smart collaborative learning context in conjunction with cloudhosting learning management systems (LMSs). Each of the five services of TaaS aims to organize a certain type of refined learning activities, so as to join together to facilitate the whole collaborative learning process. The implementation details of TaaS are demonstrated, and some typical user interfaces (UIs) are illustrated about how TaaS …


Characterizing Artificial Socio-Cognitive Technical Systems, Rob Christiaanse, Aditya K. Ghose, Pablo Noriega, Munindar P. Singh Jan 2014

Characterizing Artificial Socio-Cognitive Technical Systems, Rob Christiaanse, Aditya K. Ghose, Pablo Noriega, Munindar P. Singh

Faculty of Engineering and Information Sciences - Papers: Part A

This paper is an invitation to examine a class of socio-technical systems - artificial socio-cognitive (ASCS) - whose distinctive nature is that they may involve humans as well as artificial agents who interact in a regulated milieu. We propose a characterization of these ASCS and build on that characterization to describe how these systems evolve.


Task-Basedwireless Mobile Agents Search And Deployment For Ad Hoc Network Establishment In Disaster Environments, Xing Su, Minjie Zhang, Quan Bai Jan 2014

Task-Basedwireless Mobile Agents Search And Deployment For Ad Hoc Network Establishment In Disaster Environments, Xing Su, Minjie Zhang, Quan Bai

Faculty of Engineering and Information Sciences - Papers: Part A

In disaster environments, due to the destruction of local communication infrastructures, wireless mobile agents (robots) are employed to search and deploy to establish ad hoc networks. With the guidance of the network, first responders can efficiently perform tasks in disaster environments. However, due to the uncertainties and complexities of disaster environments and the limited capabilities of wirelessmobile agents, it is challenging to apply wireless mobile agents to disaster environments in both theory and practice. To this end, a task-based wireless mobile agents search and deployment approach is proposed for ad hoc network establishment in disaster environments. The proposed approach consists …


Agile Enterprise Architecture: A Case Of A Cloud Technology-Enabled Government Enterprise Transformation, Asif Qumer Gill, Steven Smith, Ghassan Beydoun, Vijayan Sugumaran Jan 2014

Agile Enterprise Architecture: A Case Of A Cloud Technology-Enabled Government Enterprise Transformation, Asif Qumer Gill, Steven Smith, Ghassan Beydoun, Vijayan Sugumaran

Faculty of Engineering and Information Sciences - Papers: Part A

Australian government enterprises have shown a significant interest in the cloud technology-enabled enterprise transformation. Australian government suggests the whole-of-a-government strategy to cloud adoption. The challenge is how best to realise this cloud adoption strategy for the cloud technology-enabled enterprise transformation? The cloud adoption strategy realisation requires concrete guidelines and a comprehensive practical framework. This paper proposes the use of an agile enterprise architecture framework to developing and implementing the adaptive cloud technology-enabled enterprise architecture in the Australian government context. The results of this paper indicate that a holistic strategic agile enterprise architecture approach seems appropriate to support the strategic whole-of-a-government …


Discovering Periodic Patterns In System Logs, Marcin Zimniak, Janusz R. Getta, Wolfgang Benn Jan 2014

Discovering Periodic Patterns In System Logs, Marcin Zimniak, Janusz R. Getta, Wolfgang Benn

Faculty of Engineering and Information Sciences - Papers: Part A

Historical information stored in the software system logs, audit trails, traces of user applications, etc. can be analysed to discover the patterns in periodic variations of levels and structures of the past workloads. These patterns allow for the estimation of intensities and structures of the future workloads. The correctly anticipated future workloads are used to improve performance of software systems through appropriate allocation of computing resources and through restructuring of associated system support. This work defines a concept of periodic pattern and presents the algorithms that find the periodic patterns in the traces of elementary and complex operations on data …


Multi-Phase Ant Colony System For Multi-Party Data-Intensive Service Provision, Lijuan Wang, Jun Shen Jan 2014

Multi-Phase Ant Colony System For Multi-Party Data-Intensive Service Provision, Lijuan Wang, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

The rapid proliferation of enormous sources of digital data has led to greater dependence on data-intensive services. Each service may actually request or create a large amount of data sets. To compose these services will be more challenging. Issues such as autonomy, scalability, adaptability, and robustness, become difficult to resolve. In order to automate the process of reaching an agreement among service composers, service providers, and data providers, an ant-inspired negotiation mechanism is considered in this paper. We exploit a group of agents automatically negotiating to establish agreeable service contracts. Twostage negotiation procedures are used in our data-intensive service provision …


Revisiting Optimistic Fair Exchange Based On Ring Signatures, Yang Wang, Man Ho Au, Willy Susilo Jan 2014

Revisiting Optimistic Fair Exchange Based On Ring Signatures, Yang Wang, Man Ho Au, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Optimistic fair exchange (OFE) is a kind of protocol that solves the fair exchange problem with the help of a trusted third party, usually referred to as an arbitrator. Participation of the arbitrator is required only when there is a dispute amongst the exchanging parties. Thus, the majority of the executions of the exchange does not involve the arbitrator and hence the term optimistic. The passive nature of the arbitrator makes optimistic fair exchange a desirable tool in applications such as contract signing and electronic commerce. The highest level of security of optimistic fair exchange in the literature is the …


K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou Jan 2014

K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period …


Self-Reported Gambling Problems And Digital Traces, James Phillips, James Sargeant, Rowan Ogeil, Yang-Wai Chow, Alex Blaszczynski Jan 2014

Self-Reported Gambling Problems And Digital Traces, James Phillips, James Sargeant, Rowan Ogeil, Yang-Wai Chow, Alex Blaszczynski

Faculty of Engineering and Information Sciences - Papers: Part A

Copyright 2014, Mary Ann Liebert, Inc. 2014. The Diagnostic and Statistical Manual of Mental Disorder, Fifth Edition (DSM-5), lists concealment as one of the symptoms of a gambling disorder. However, some transactions are more likely to leave permanent records of gambling transactions (credit, consumer loyalty schemes) than others (cash, Internet cash, Internet cafes, prepaid phones). An online survey of 815 participants recruited through newspaper and online sites elicited consumer preferences for a variety of transactions and communication media. Hierarchical multiple regression accounted for age, gender, housing status, and involvement in gambling before considering relationships between consumer preferences and scores on …


Speech Analysis For Alphabets In Bangla Language: Automatic Speech Recognition, Asm Sayem Jan 2014

Speech Analysis For Alphabets In Bangla Language: Automatic Speech Recognition, Asm Sayem

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a technique for recognizing spoken letter in Bengali Language. We first derive feature from spoken letter. Mel-frequency cepstral coefficient (MFCC) has been used to characterize a feature. Dynamic time warping (DTW) employed to calculate the distance of an unknown letter with the stored ones. K-nearest neighbors (KNN) algorithm is used to improve accuracy in noisy environment.


Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong Jan 2014

Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. To capture the need of data privacy against an untrusted auditor, Hao et al. formally defined "privacy against third party verifiers" as one of the security requirements and proposed a protocol satisfying this definition. However, we observe that all existing protocols with public verifiability supporting data update, …


Creating Value Through Virtual Teams: A Current Literature Review, Akemi T. Chatfield, Vivian Shlemoon, Wilbur Redublado, Gary Darbyshire Jan 2014

Creating Value Through Virtual Teams: A Current Literature Review, Akemi T. Chatfield, Vivian Shlemoon, Wilbur Redublado, Gary Darbyshire

Faculty of Engineering and Information Sciences - Papers: Part A

Globally, virtual teams (VT) as ICT-enabled emergent network organisation forms have gained international validity by innovative organisations, with a corresponding surge of interest in understanding how organisations can leverage VT to create business value. Despite growing deliberations in VT literature on managing VT, tasks and outcomes, however, creating business value through VT remains an unresolved theoretical and pragmatic conundrum. A review of prior relevant literature is essential to advancing knowledge. The paucity of published review articles seems to have impeded the field's accumulation of VT knowledge. This research, therefore, reviews the current literature on case studies of VT to address …


Acid Sulphate Soil Interaction With Groundwater: A Remediation Case Study In East Trinity, A Vahedian, S Asadzadeh Aghdaei, S Mahini Jan 2014

Acid Sulphate Soil Interaction With Groundwater: A Remediation Case Study In East Trinity, A Vahedian, S Asadzadeh Aghdaei, S Mahini

Faculty of Engineering and Information Sciences - Papers: Part A

Contaminated soil and groundwater resulting from pyrite oxidation occur in coastal areas throughout the world, but do not pose an issue unless allowed to oxidise as a result of drainage or excavation. The exposure and oxidisation of these soils increase the concentration of iron and aluminium ions and cause adverse impact on flora and fauna and also water quality. Depending on the climate conditions and scale of areas contaminated by acid sulphate soil (ASS), several remediation techniques (e.g. fixed-level weirs, two-way modified floodgates, permeable reactive barriers, etc.) can be employed to increase the pH near to neutral and prevent the …


Use Of Shock Mats For Mitigating Degradation Of Railroad Ballast, B Indraratna, S Nimbalkar, S K. Navaratnarajah, C Rujikiatkamjorn, T Neville Jan 2014

Use Of Shock Mats For Mitigating Degradation Of Railroad Ballast, B Indraratna, S Nimbalkar, S K. Navaratnarajah, C Rujikiatkamjorn, T Neville

Faculty of Engineering and Information Sciences - Papers: Part A

In Australia, increasing demand for High Speed Rail (HSR) and heavier freight transport is a technical and economic challenge for practicing engineers, designers and researchers. Because of this increased train speed and axle load, high undue stresses are transferred to the ballast and underlying formation. Ballast degradation is a major factor affecting track longevity and stability. Use of energy absorbing shock mats to reduce noise and vibrations is an established practice. The shock mat is sometimes called as Under Sleeper Pad (USP) and Under Ballast Mat (UBM) depending upon their placement position. However, studies to analyse their effectiveness in minimising …