34 resultados para Beardsley, Aubrey, 1872-1898.
Resumo:
In 1859, Queensland was separated from New South Wales as an independent colony. At this time the new Governor conspired to ensure the citizens did not inherit the old colonies system of full male suffrage. This was not returned until the Elections Act of 1872. However, the extended franchise was not a result of either democratic values or other ideological intentions. This article will analyse parliamentary debates to show that the revision to full suffrage was a result of administrative expediency driven by an inability to prevent abuse of the limited franchise.
Resumo:
The Noblest of Professions: Schoolmasters at Hastings 1872-1894 is a skilfully developed study of educational developments outside the Australian metropolises and in a small, but significant, pioneering rural community in the late colonial period. It is an important contribution to the formerly neglected field of local and regional history in Australia. It extends our knowledge of the life experiences of the schoolmaster in an isolated community and the regard local people had for him, together with the significant and varied social and leadership roles he played regularly and occasionally in rural affairs. The rural schoolmaster and his concerns are vividly brought to life in a compelling portrayal in this book. In all a very significant contribution to Australian history and to the history of education in its regional and local context.
Resumo:
J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card) In this paper, I follow an argument that Lindt held a position in his particular colonial environment where he was simultaneously both an insider and an outsider and that such a position may be considered prerequisite in stimulating exchange. A study of the transition of J.W. Lindt in Grafton, N.S.W. in the 1860s from a traveller to a migrant and subsequently to a professional photographer, as well as Lindt’s photographic career, which evolved through strategic action and technical approaches to photography, bears witness to his cultural relativity. One untitled photograph from this period of work constructs a unique commentary of Australian colonial life that illustrates a non-hegemonic position, particularly as it was included in one of the first albums of photographs of Aborigines that Lindt gifted to an illustrious person (in this case the Mayor of Grafton). As in his other studio constructions, props and backdrops were arranged and sitters were positioned with care, but this photograph is the only one in the album that includes a non-Aborigine in a relationship to an Aborigine. An analysis of the props, technical details of the album and the image suggests a reconciliatory aspect that thwarts the predominant attitudes towards Aborigines in the area at that time.
Resumo:
J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card)...
Resumo:
Sugarcane orange rust, caused by Puccinia kuehnii, was once considered a minor disease in the Australian sugar industry. However, in 2000 a new race of the pathogen devastated the high-performing sugarcane cultivar Q124, and caused the industry Aus$150–210 million in yield losses. At the time of the epidemic, very little was known about the genetic and pathogenic diversity of the fungus in Australia and neighbouring sugar industries. DNA sequence data from three rDNA regions were used to determine the genetic relationships between isolates within two P. kuehnii collections. The first collection comprised only recent Australian field isolates and limited sequence variation was detected within this population. In the second study, Australian isolates were compared with isolates from Papua New Guinea, Indonesia, China and historical herbarium collections. Greater sequence variation was detected in this collection and phylogenetic analyses grouped the isolates into three clades. All isolates from commercial cane fields clustered together including the recent Australianfield isolates and the Australian historical isolate from 1898.The other two clades included rust isolates from wild and garden canes in Indonesia and PNG. These rusts appeared morphologically similar to P. kuehnii and could potentially pose a quarantine threat to the Australian sugar industry. The results have revealed greater diversity in sugarcane rusts than previously thought.
Resumo:
The interaction of quercetin, which is a bioflavonoid, with bovine serum albumin (BSA) was investigated under pseudo-physiological conditions by the application of UV–vis spectrometry, spectrofluorimetry and cyclic voltammetry (CV). These studies indicated a cooperative interaction between the quercetin–BSA complex and warfarin, which produced a ternary complex, quercetin–BSA–warfarin. It was found that both quercetin and warfarin were located in site I. However, the spectra of these three components overlapped and the chemometrics method – multivariate curve resolution-alternating least squares (MCR-ALS) was applied to resolve the spectra. The resolved spectra of quercetin–BSA and warfarin agreed well with their measured spectra, and importantly, the spectrum of the quercetin–BSA–warfarin complex was extracted. These results allowed the rationalization of the behaviour of the overlapping spectra. At lower concentrations ([warfarin] < 1 × 10−5 mol L−1), most of the site marker reacted with the quercetin–BSA, but free warfarin was present at higher concentrations. Interestingly, the ratio between quercetin–BSA and warfarin was found to be 1:2, suggesting a quercetin–BSA–(warfarin)2 complex, and the estimated equilibrium constant was 1.4 × 1011 M−2. The results suggest that at low concentrations, warfarin binds at the high-affinity sites (HAS), while low-affinity binding sites (LAS) are occupied at higher concentrations.
Resumo:
This paper argues a model of complex system design for sustainable architecture within a framework of entropy evolution. The spectrum of sustainable architecture consists of the efficient use of energy and material resource in life-cycle of buildings, the active involvement of the occupants in micro-climate control within buildings, and the natural environmental context. The interactions of the parameters compose a complex system of sustainable architectural design, of which the conventional linear and fragmented design technologies are insufficient to indicate holistic and ongoing environmental performance. The complexity theory of dissipative structure states a microscopic formulation of open system evolution, which provides a system design framework for the evolution of building environmental performance towards an optimization of sustainability in architecture.
Resumo:
Maximum-likelihood estimates of the parameters of stochastic differential equations are consistent and asymptotically efficient, but unfortunately difficult to obtain if a closed-form expression for the transitional probability density function of the process is not available. As a result, a large number of competing estimation procedures have been proposed. This article provides a critical evaluation of the various estimation techniques. Special attention is given to the ease of implementation and comparative performance of the procedures when estimating the parameters of the Cox–Ingersoll–Ross and Ornstein–Uhlenbeck equations respectively.
Resumo:
In late 2007, Gold Coast City Council libraries embarked on an online library project, designed to ramp up libraries’ online services to customers. As part of this project, the Young People’s team identified a need to connect with youth aged 12 to 16 in the online environment, in order to create a direct channel of communication with this market segment and encourage them to engage with the library. Blogging was identified as an appropriate means of communicating with both current and potential library customers from this age group. The Young People’s team consequently prepared a concept plan for a youth blog for launch in Children’s Book Week 2008 and are working towards development of management and administrative models and documentation and implementation of the blog itself. While many libraries have been quick to take up Web 2.0-style services, there has been little formal publication about the successes (or failures) of this type of project. Likewise, few libraries have published about the planning, management, and administration of such services. The youth blog currently in development at Gold Coast City Council libraries will be supported by a robust planning phase and will be rigorously evaluated as part of the project. This paper will report on the project (its aims, objectives and outputs), the planning process, and the evaluation activities and outcomes.
Resumo:
The mosaic novel - with its independent 'story-tiles' linking together to form a complete narrative - has the potential to act as a reflection on the periodic resurfacing of unconscious memories in the conscious lives of fictional characters. This project is an exploration of the mosaic text as a fictional analogue of involuntary memory. These concepts are investigated as they appear in traditional fairy tales and engaged with in this thesis's creative component, Sourdough and Other Stories (approximately 80,000 words), a mosaic novel comprising sixteen interconnected 'story-tiles'. Traditional fairy tales are non-reflective and conducive to forgetting (i.e. anti-memory); fairy tale characters are frequently portrayed as psychologically two-dimensional, in that there is no examination of the mental and emotional distress caused when children are stolen/ abandoned/ lost and when adults are exiled. Sourdough and Other Stories is a creative examination of, and attempted to remedy, this lack of psychological depth. This creative work is at once something more than a short story collection, and something that is not a traditional novel, but instead a culmination of two modes of writing. It employs the fairy tale form to explore James' 'thorns in the spirit' (1898, p.199) in fiction; the anxiety caused by separation from familial and community groups. The exegesis, A Story Told in Parts - Sourdough and Other Stories is a critical essay (approximately 20,000 words in length), a companion piece to the mosaic novel, which analyses how my research question proceeded from my creative work, and considers the theoretical underpinnings of the creative work and how it enacts the research question: 'Can a writer use the structural possibilities of the mosaic text to create a fictional work that is an analogue of an involuntary memory?' The cumulative effect of the creative and exegetical works should be that of a dialogue between the two components - each text informing the other and providing alternate but complementary lenses with which to view the research question.
Resumo:
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.