502,446 research outputs found

    Escape Routes in Road and Railway Tunnels Using TBM technology vs. NATM

    Get PDF
    Import 02/11/2016Import 20/01/2016Import 11/02/2016Moje diplomová práce se zabývá problematikou technologie TBM a NRTM – únikové cesty v silničních a železničních tunelech. V úvodu je popsána technologie plnoprofilového razícího stroje (TBM – Tunnel Boring Machines) a nové rakouské tunelovací metodě (NRTM), jejich pozitiva a negativa. Následně je řešen projekt tunelu Ejpovice a metody konstrukčních řešení napojení tunelové propojky na traťový tunel. Dále je řešen matematický model na tunelu v Ejpovicích v softwaru Midas.My master thesis deals with escape routes in road and railway tunnels using TBM technology vs. NATM. In the introduction describes the technology Tunnel Boring Machines (TBM) and New Austrian tunnelling method (NATM), they advantages and disadvantages. Subsequently, the project focused on the tunnel Ejpovice methods and design solutions connecting cross passage on track tunnel. Also describe mathematical model on the tunnel in Ejpovice in software Midas.224 - Katedra geotechniky a podzemního stavitelstvívelmi dobř

    War on the Wards: The collapse of health care infrastructure resulting from violent conflict

    Get PDF
    Introduction: While utilizing satellite images to verify reports of hospital damage resulting from armed conflict allows for remote assessment, the use of private satellites to gain access to images prohibits widespread use. The questions this study sought to answer were: Is it possible to replicate the findings of previous reports of hospital damage that used the services of private satellite imagery using open source software, such as Google Earth? What variations exist among the different sites where damage to hospitals is visible, and what gradation is possible? Is this methodology applicable to other examples of armed conflict? Methods: Using the map of bombed Syrian hospitals published and maintained by Physicians for Human Rights, hospitals were selected according to their location and the time period of the attack. These coordinates were entered into Google maps and once the attack was verified, a grade of damage was assigned. This methodology was then applied to reports of similar attacks in Iraq. Results: While much information can be gleaned from open source data such as Google Earth, the level of detail in satellite images is lower and coordinates data is less specific. [Further results pending.] Conclusion: There is room for the use of open source satellite technology to track and grade the damage done to health care infrastructure during armed conflict. [More conclusions pending.

    Evaluating the Productivity of Software Engineers in Enterprise Development

    Get PDF
    Managing and evaluating the work of software engineers creating complex products at large corporations is particularly challenging with no standardized system to recognize productivity. Cerner Corporation, a leading supplier of healthcare information technology solutions, gives managers substantial latitude in tracking productivity, yielding high variance. The research reported here involves an examination of relevant background literature and interviews of Cerner associates with multiple roles in the organization as well as the author's own background. By identifying the essential components of good software engineering and potential measurement systems, the research yields a design that the author will use to track the productivity of his direct report engineers in the next annual performance period. In it, the primary metric is the completion of story points, an Agile software development representation of the relative size and complexity of work to be done. Tracking the introduction of defects is an indicator of an engineer's code quality, although sufficient context must be captured. Finally, a peer feedback system helps ensure the manager recognizes performance from other perspectives

    ICT in schools 2004 report : the impact of government initiatives : secondary music

    Get PDF

    Measures for assessing the impact of ICT use on attainment

    Get PDF
    "Building on ImpaCT2, this study aims to design a measure or measures capable of tracking 'snapshot' data, such that it will be possible to monitor the development of ICT use to support attainment" -- page 4

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm
    corecore