983 resultados para core set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a three-dimensional numerical analysis of the electromagnetic forces within a high voltage superconducting Fault Current Limiter (FCL) with a saturated core under short-circuit conditions. The effects of electrodynamics forces in power transformer coils under short-circuit conditions have been reported widely. However, the coil arrangement in an FCL with saturated core differs significantly from existing reactive devices. The boundary element method is employed to perform an electromagnetic force analysis on an FCL. The analysis focuses on axial and radial forces of the AC coil. The results are compared to those of a power transformer and important design considerations are highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SET on a sparse stage with a ladder, a table, a few chairs and a backdrop of plastic sheeting, Hamlet Apocalypse retails the core of Shakespeare's story in combination with the actor's relation to the concept of the end of everything.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design Science Research (DSR) has emerged as an important approach in Information Systems (IS) research, evidenced by the plethora of recent related articles in recognized IS outlets. Nonetheless, discussion continues on the value of DSR for IS and how to conduct strong DSR, with further discussion necessary to better position DSR as a mature and stable research paradigm appropriate for IS. This paper contributes to address this need, by providing a comprehensive conceptual and argumentative positioning of DSR relative to the core of IS. This paper seeks to argue the relevance of DSR as a paradigm that addresses the core of IS discipline well. Here we use the framework defined by Wand and Weber, to position what the core of IS is.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At the core of our uniquely human cognitive abilities is the capacity to see things from different perspectives, or to place them in a new context. We propose that this was made possible by two cognitive transitions. First, the large brain of Homo erectus facilitated the onset of recursive recall: the ability to string thoughts together into a stream of potentially abstract or imaginative thought. This hypothesis is sup-ported by a set of computational models where an artificial society of agents evolved to generate more diverse and valuable cultural outputs under conditions of recursive recall. We propose that the capacity to see things in context arose much later, following the appearance of anatomically modern humans. This second transition was brought on by the onset of contextual focus: the capacity to shift between a minimally contextual analytic mode of thought, and a highly contextual associative mode of thought, conducive to combining concepts in new ways and ‘breaking out of a rut’. When contextual focus is implemented in an art-generating computer program, the resulting artworks are seen as more creative and appealing. We summarize how both transitions can be modeled using a theory of concepts which high-lights the manner in which different contexts can lead to modern humans attributing very different meanings to the interpretation of one concept.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A recent District Court case is believed to be the first in Queensland in which UCPR r 5 has been used to support the setting aside of a regularly entered default judgment without a costs order.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application before the court in Millerview Constructions Pty Ltd v Palmer Plumbing Pty Ltd [2008] QSC 005 raised a significant question regarding the appropriate construction of s 459G of the Corporations Act 2001 (Cth) (the Act). The decision emphasises the importance of ensuring that any application to set aside a statutory demand must be served in a timely way on the creditor at the creditor’s address for service as stated in the statutory demand, or in strict compliance with another manner authorised by the Act.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conducting research into crime and criminal justice carries unique challenges. This Handbook focuses on the application of 'methods' to address the core substantive questions that currently motivate contemporary criminological research. It maps a canon of methods that are more elaborated than in most other fields of social science, and the intellectual terrain of research problems with which criminologists are routinely confronted. Drawing on exemplary studies, chapters in each section illustrate the techniques (qualitative and quantitative) that are commonly applied in empirical studies, as well as the logic of criminological enquiry. Organized into five sections, each prefaced by an editorial introduction, the Handbook covers: • Crime and Criminals • Contextualizing Crimes in Space and Time: Networks, Communities and Culture • Perceptual Dimensions of Crime • Criminal Justice Systems: Organizations and Institutions • Preventing Crime and Improving Justice Edited by leaders in the field of criminological research, and with contributions from internationally renowned experts, The SAGE Handbook of Criminological Research Methods is set to become the definitive resource for postgraduates, researchers and academics in criminology, criminal justice, policing, law, and sociology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last twenty years, the use of open content licenses has become increasingly and surprisingly popular. The use of such licences challenges the traditional incentive-based model of exclusive rights under copyright. Instead of providing a means to charge for the use of particular works, what seems important is mitigating against potential personal harm to the author and, in some cases, preventing non-consensual commercial exploitation. It is interesting in this context to observe the primacy of what are essentially moral rights over the exclusionary economic rights. The core elements of common open content licences map somewhat closely to continental conceptions of the moral rights of authorship. Most obviously, almost all free software and free culture licences require attribution of authorship. More interestingly, there is a tension between social norms developed in free software communities and those that have emerged in the creative arts over integrity and commercial exploitation. For programmers interested in free software, licence terms that prohibit commercial use or modification are almost completely inconsistent with the ideological and utilitarian values that underpin the movement. For those in the creative industries, on the other hand, non-commercial terms and, to a lesser extent, terms that prohibit all but verbatim distribution continue to play an extremely important role in the sharing of copyright material. While prohibitions on commercial use often serve an economic imperative, there is also a certain personal interest for many creators in avoiding harmful exploitation of their expression – an interest that has sometimes been recognised as forming a component of the moral right of integrity. One particular continental moral right – the right of withdrawal – is present neither in Australian law or in any of the common open content licences. Despite some marked differences, both free software and free culture participants are using contractual methods to articulate the norms of permissible sharing. Legal enforcement is rare and often prohibitively expensive, and the various communities accordingly rely upon shared understandings of acceptable behaviour. The licences that are commonly used represent a formalised expression of these community norms and provide the theoretically enforceable legal baseline that lends them legitimacy. The core terms of these licences are designed primarily to alleviate risk in sharing and minimise transaction costs in sharing and using copyright expression. Importantly, however, the range of available licences reflect different optional balances in the norms of creating and sharing material. Generally, it is possible to see that, stemming particularly from the US, open content licences are fundamentally important in providing a set of normatively accepted copyright balances that reflect the interests sought to be protected through moral rights regimes. As the cost of creation, distribution, storage, and processing of expression continues to fall towards zero, there are increasing incentives to adopt open content licences to facilitate wide distribution and reuse of creative expression. Thinking of these protocols not only as reducing transaction costs but of setting normative principles of participation assists in conceptualising the role of open content licences and the continuing tensions that permeate modern copyright law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This volume represents teh second collection of working papers and articles by participants in the Higher Education Policy Project (HEPP), a project funded by the Australian Research Council and based in the Graduate School of Education at the University of Queensland. The first volume, 'Higher Education in Transition: Working Papers of the Higher Education Policy Project (Bella, McCollow and Knight, 1993), took the broad theme of "higher education in transition" in order to introduce readers the HEPP and give them some idea of the breadth of the research being pursued by the HEPP research team itself and by the cohort of post-graduate students also associated with the project. Since then, higher education has remained in transition. Stubborn and resurgent questions continue: such as what a university ought to be, what forms of research should be supported in a mass system, and how institutional accountability can be demonstrated. In differing ways and using a variety of research perspectives and methodologies, the contributors to this volume explore these and other questions of relevance to higher education today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A core component for the prevention of re-occurring incidents within the rail industry is rail safety investigations. Within the current Australasian rail industry, the nature of incident investigations varies considerably between organisations. As it stands, most of the investigations are conducted by the various State Rail Operators and Regulators, with the more major investigations in Australia being conducted or overseen by the Australian Transport Safety Bureau (ATSB). Because of the varying nature of these investigations, the current training methods for rail incident investigators also vary widely. While there are several commonly accepted training courses available to investigators in Australasia, none appear to offer the breadth of development needed for a comprehensive pathway. Furthermore, it appears that no single training course covers the entire breadth of competencies required by the industry. These courses range in duration between a few days to several years, and some were run in-house while others are run by external consultants or registered training organisations. Through consultations with rail operators and regulators in Australasia, this paper will identify capabilities required for rail incident investigation and explore the current training options available for rail incident investigators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The crystal structures of the 1:1 proton-transfer compounds of isonipecotamide (piperidine-4-carboxamide) with the monocyclic heteroaromatic carboxylic acids, isonicotinic acid, picolinic acid, dipicolinic acid and pyrazine-2,3-dicarboxylic acid have been determined at 200 K and their hydrogen-bonding patterns examined. The compounds are respectively anhydrous 4-carbamoylpiperidinium pyridine-4-carboxylate (1), the partial hydrate 4-carbamoylpiperidinium pyridine-2-carboxylate 0.25 water (2), the solvate 4-carbamoylpiperidinium 6-carboxypyridine-2-carboxylate methanol monosolvate (3), and anhydrous 4-carbamoylpiperidinium 3-carboxypyrazine-2-carboxylate (4). In compounds 1 and 3, hydrogen-bonding interactions give two-dimensional sheet structures which feature enlarged cyclic ring systems, while in compounds 2 and 4, three-dimensional structures are found. The previously described cyclic R2/2(8) hydrogen-bonded amide-amide dimer is present in 2 and 3. The hydrogen-bonding in 2 involves the partial-occupancy water molecule while the structure of 4 is based on inter-linked homomolecular hydrogen-bonded cation-cation and anion-anion associated chains comprising head-to-tail interactions. This work further demonstrates the utility of the isonipecotamide cation in the generation of chemically stable hydrogen-bonded systems, particularly with aromatic carboxylate anions, providing crystalline solids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Touch keyboarding as a vocational skill is disappearing at a time when students and educators across alleducational sectors are expected to use a computer keyboard on a regular basis. there is documentation surrounding the embedding of Information and Communication Technology (ICT) within the curricula and yet within the National Training Packages touch keyboarding, previously considered a core component, is now an elective in the Business Services framework. This situation is an odds with current practice overseas where touch keyboarding is a component of primary and secondary curricula. From Rhetoric to Practice explores the current issues and practice in teaching and learning touch keyboarding in primary, secondary and tertiary institutions. Through structured interview participants detailed current practice of teachers and their students. Further, tertiary students participated in a training program aimed at achquiring touch keyboarding as a skill to enhance their studies. The researcher's background experience of fifteen years teaching touch keyboarding and computer literacty to adults and 30 years in Business Services trade provides a strong basis for this project. The teaching experience is enhanced by industry experience in administration, course coordination in technical, community and tertiary institutions and a strong commitment to the efficient usage of a computer by all. The findings of this project identified coursework expectations requiring all students from kindergarten to tertiary to use a computer keyboard on a weekly basis and that neither teaching nor learning tough keyboarding appears in the primary, secondary and tertiary curricula in New South Wales. Further, teachers recognised tough keyboarding as the prefered style over 'hunt and peck' keyboarding while acknowledging the teaching and learning difficulties of time constraints, the need for qualified touch keyboarding teachers and issues arising when retraining students from existing poor habits. In conclusion, this project recommends that computer keyboarding be defined as a writing tool for education, vocation and life, with early instruction set in primary schooling area and embedding touch keyboarding with the secondary, technical and tertiary areas and finally to draw the attention of educational authorities to the Duty Of Care aspects associated with computer keyboarding in the classroom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this investigation was to elucidate the reductions in muscle, skin and core temperature following exposure to −110°C whole body cryotherapy (WBC), and compare these to 8°C cold water immersion (CWI). Twenty active male subjects were randomly assigned to a 4-min exposure of WBC or CWI. A minimum of 7 days later subjects were exposed to the other treatment. Muscle temperature in the right vastus lateralis (n = 10); thigh skin (average, maximum and minimum) and rectal temperature (n = 10) were recorded before and 60 min after treatment. The greatest reduction (P<0.05) in muscle (mean ± SD; 1 cm: WBC, 1.6±1.2°C; CWI, 2.0±1.0°C; 2 cm: WBC, 1.2±0.7°C; CWI, 1.7±0.9°C; 3 cm: WBC, 1.6±0.6°C; CWI, 1.7±0.5°C) and rectal temperature (WBC, 0.3±0.2°C; CWI, 0.4±0.2°C) were observed 60 min after treatment. The largest reductions in average (WBC, 12.1±1.0°C; CWI, 8.4±0.7°C), minimum (WBC, 13.2±1.4°C; CWI, 8.7±0.7°C) and maximum (WBC, 8.8±2.0°C; CWI, 7.2±1.9°C) skin temperature occurred immediately after both CWI and WBC (P<0.05). Skin temperature was significantly lower (P<0.05) immediately after WBC compared to CWI. The present study demonstrates that a single WBC exposure decreases muscle and core temperature to a similar level of those experienced after CWI. Although both treatments significantly reduced skin temperature, WBC elicited a greater decrease compared to CWI. These data may provide information to clinicians and researchers attempting to optimise WBC and CWI protocols in a clinical or sporting setting.