Spelling suggestions: "subject:"1nvestigation"" "subject:"anvestigation""
341 |
An Investigation of the McMaster Commuter DistributionNeale, John Linton 04 1900 (has links)
<p> The purpose of this study is to investigate the McMaster commuter distribution. The total analysis is carried out in two subanalyses. The first analysis examines the effect that different
variables have on the mean trip length of various commuter groups. The variables examined in the first analysis are: residential tenure, occupation, duration of service or study, parking permit ownership and part-time versus full-time status of students. In general the first analysis is concerned with the mean trip length of on campus Faculty, Staff, and Students. The first analysis verified that residential tenure is an important variable in that students who commute from the homes of parents average a considerably greater mean trip length than
students who commute from rented accommodation.</p> <p> The second analysis employs a disaggregate singly-constrained spatial interaction model to distribute trips between McMaster and student residential locations. The second analysis shows that: (i) the production-constrained model fits considerably better with observed data when the sample is partitioned into student renter and stay at home groups than when the sample is not partitioned. The attractiveness factors were varied between the two groups. Renters were considered to be
attracted to renter occupied dwellings in a zone while students commuting from the homes of parents were considered to be attracted to the number of owner occupied dwellings in a zone. (ii) straight line distance as a surrogate for travel cost yields a better fit for the renter group while automobile travel-time facilitates a better fit for the stay at home group. Auto travel time yields a better fit for peripheral trips because of the tendency for these trips to be made by car. Given the understanding that student renters are predominantly bus users who have chosen to locate close to the campus, euclidean distance is apparently more reflective of the travel impedance experienced by this group. Future research should attempt to qualitatively link measures of travel cost with the client group they are attempting to model.</p> / Thesis / Bachelor of Arts (BA)
|
342 |
Hidden gemsFransson, Emma January 2022 (has links)
My interest in architecture is based on discovery and stories. The citys rooms is for everyone. Places for the people to use. Rooms programmed for different purposes, do they really need to be activated to be relevant and exist? I have selected three places that I discovered and became attached to, for strong senses and architectural qualities. Using archival materials and architectural representational techniques, working between 2D to 3D, digital and analog, have I explored the sites to better understand them. I have also found collective descriptions of experiences, activities and events from the places that have made me gain a different kind of understanding. How to convey the history of a place through architectural mediums and how can I work with representation to show the specific events or activities that has attended at the site?Can the narratives create more interest in hidden public places in the city? I've investigated Sagorummet; The chair that disappeared, Tysta Mari gången; The activety that closed down and Glasbrukstäppan; The Swan that flew away
|
343 |
The effects of laundering and soiling of water resistant fabric on blood drip stainsHarter, Hanna J. 01 February 2023 (has links)
Bloodstain Pattern Analysis is a rapidly growing area of research in the forensic science field. It is not uncommon for blood to be present on surfaces such as clothing, furniture, carpet, and more, during the commission of a crime. . Research of how blood interacts with different porous surfaces, such as textiles and fabrics, is relatively unexplored in the field of forensic science. Prior to a bloodshed event in which blood may be deposited onto clothing, the fabric may have been laundered in a variety of ways. In this research, swatches of a 100% nylon, water resistant fabric were subjected to seventeen different laundering and soiling processes. The laundering products used included Tide® Liquid Laundry Detergent, Downy® Fabric Softener, Downy® Unstoppables In-Wash Scent Boosters, Bounce® Dryer Sheets, Clorox® Zero Splash Bleach Packs, and OxiClean™ Max Force Laundry Stain Remover. Soiling included wearing swatches of fabric and leaving them in direct sunlight. Whole human blood was inverted, vortexed, then transferred using a disposable transfer pipette. The sample was held 36 in./3 ft. above each sample at a 90-degree angle, using an apparatus made from a flat edge and a protractor to ensure consistency. Blood drops were deposited onto each swatch of fabric, photographed, and microscopically examined. The drip stains were measured and characteristics of the blood, fabric, and the interaction of the two were recorded. Results showed some trends, such as an increased breakdown of fabric structure when bleach was used, and an increase in wicking when treated with scent boosters. Overall, the results were varied in all comparisons.
|
344 |
Using Web bugs and honeytokens to investigate the source of phishing attacksMcRae, Craig Michael 03 May 2008 (has links)
Phishing is the use of social engineering and electronic communications such as emails to try and illicit sensitive information such as usernames, passwords, and financial information. This form of identity theft has become a rampant problem in today’s society. Phishing attacks have cost financial institutions millions of dollars per year and continue to do so. Today’s defense against phishing attacks primarily consists of trying to take down the phishing web site as quickly as possible before it can claim too many victims. This thesis demonstrates that is possible to track down a phisher to the IP address of the phisher’s workstation rather than innocent machines used as intermediaries. By using web bugs and honeytokens on the fake web site forms the phisher presents, one can log accesses to the web bugs by the phisher when the attacker views the results of the forms.
|
345 |
SLOPE INVESTIGATION OF PADDOCK HILLS CINCINNATI, OHIOMCCORMICK, COURTNEY ELIZABETH January 2003 (has links)
No description available.
|
346 |
Hydrologic investigation of coal mine spoil near Howard Williams Lake, Perry County, OhioTurney, Douglas C. January 1996 (has links)
No description available.
|
347 |
A laboratory investigation of the resilient response characteristics of pavement and subgrade materialsWilson, Bryan E. January 1989 (has links)
No description available.
|
348 |
Analytical and numerical investigation of billet augmented hydrostatic extrusionSondor, Anantha Shayana January 1989 (has links)
No description available.
|
349 |
Experimental and numerical investigation of a deep-corrugated steel, box-type culvertRauch, Alan F. January 1990 (has links)
No description available.
|
350 |
Investigation of hydroforming sheet metal with varying blankholding loadsJiang, Wei January 1990 (has links)
No description available.
|
Page generated in 0.0998 seconds