6,327 research outputs found
The Coming Boom in Computer Loads
Computers and other electronic equipment now consume as much electricity as electric steel furnaces, and their growth shows no signs of slowing. Utilities are active participants in the computer revolution. Northeast Utilities, for example, reports that 20% of electricity use in a typical new office building in its service area goes to computers. Given the expected growth in computers and computer loads, this technology deserves greater attention from utility planners and other energy analysts. It is shown that the commercial sector has been the largest contributor to kilowatt-hour (kwh) sales growth and that new uses within the commercial sector have accounted for the biggest portion of this growth. Confirming this conclusion are a 4-year Department of Energy-funded study of the Park Plaza Building office tower and a 1985 study of 181 office buildings by Northwest Utilities. A prospective study suggests that computers could account for as much as 150 billion kwh by the early 1990s
Engineering enterprise through intellectual property education - pedagogic approaches
Engineering faculties, despite shrinking resources, are delivering to new enterprise
agendas that must take account of the fuzzying of disciplinary boundaries. Learning and
teaching, curriculum design and research strategies reflect these changes. Driven by changing
expectations of how future graduates will contribute to the economy, academics in
engineering and other innovative disciplines are finding it necessary to re-think undergraduate
curricula to enhance studentsâ entrepreneurial skills, which includes their awareness and
competence in respect of intellectual property rights [IPRs]. There is no well established
pedagogy for educating engineers, scientists and innovators about intellectual property. This
paper reviews some different approaches to facilitating non-law studentsâ learning about IP.
Motivated by well designed âintended learning outcomesâ and assessment tasks, students can
be encouraged to manage their learning... The skills involved in learning about intellectual
property rights in this way can be applied to learning other key, but not core, subjects. At the
same time, students develop the ability to acquire knowledge, rather than rely on receiving it,
which is an essential competence for a âknowledgeâ based worker
Experiments for satellite and material recovery from orbit. Volume I - Summary Final report
Experiment missions for OSO satellite rendezvous, capture, material retrieval, refurbishment, and extravehicular operation wor
Study of effects of injector geometry on fuel-air mixing and combustion
An implicit finite-difference method has been developed for computing the flow in the near field of a fuel injector as part of a broader study of the effects of fuel injector geometry on fuel-air mixing and combustion. Detailed numerical results have been obtained for cases of laminar and turbulent flow without base injection, corresponding to the supersonic base flow problem. These numerical results indicated that the method is stable and convergent, and that significant savings in computer time can be achieved, compared with explicit methods
Experiments for Satellite and Material Recovery from Orbit. Volume III - Experiment Missions Final Report
Experiment missions for OSO satellite rendezvous, capture, material recovery, refurbishment, and extravehicular operation wor
Child homicide: generating victim and suspect risk profiles
Purpose
â In England and Wales, on average one child every week is a victim of homicide. The purpose of this paper is to explore whether different victim-risk profiles and suspect variables can be differentiated for specific victim ages.
Design/methodology/approach
â This paper presents a preliminary analysis of more than 1,000 child homicides committed in England and Wales between 1996 and 2013, from data provided through the Homicide Index. Statistical techniques such as cluster analysis were used to identify specific victim-risk profiles and to analyse suspect variables according to the age of victim.
Findings
â The findings present a clearer picture of the risk-age relationship in child homicide, whereby several specific risk profiles are identified for specific child ages, comprised of crime variables including; likely victim and suspect demographics, the most likely circumstances of the homicide and methods of killing. Using similar techniques, a number of tentative clusters of suspects implicated in child homicide are also described and analysed, with suggestions of further analysis that might prove of value.
Practical implications
â The practical implications cannot be understated. For those professionals working in the fields of child protection and criminal investigation the identification of risk profiles promises to provide a back-cloth with which to practice when confronted with complex and distressing child homicide scenarios. This research promises most to those currently training in related professions.
Originality/value
â Although the statistical level of risk has been linked with the age of a child (with younger children being most vulnerable to killing by a parent or step-parent and older children most vulnerable to killing by acquaintances and strangers), extant research is yet to progress beyond the identification of broad age-risk categories. The paper concludes with a discussion of the likely implications for those charged with reducing and investigating child homicide and outlines the possibility of future research
- âŠ