232 resultados para name
Resumo:
Creativity in Hollywood is not just about telling stories onscreen. Deal making is the name of the game in Hollywood from globally released franchised blockbusters to art house releases. Riding the currents of the twentieth century Hollywood has maintained dominance with its highly diversified production slate built on creative financing solutions. Using historical and recent case studies, the presentation will look behind the images at the numbers and discuss how 'the suits' have been, and continue to be just as creative as the 'creatives' in contemporary Hollywood.
Resumo:
The name apophyllite refers to a specific group of phyllosilicates, a class of minerals that also includes the micas and are a class of minerals of similar chemical makeup that comprise a solid solution series, and includes the members apophyllite-(KF), apophyllite-(KOH) and apophyllite-(NaF). Fluorapophyllite apophyllite-(KF) and hydroxyapophyllite apophyllite-(KOH) are different minerals only because of the difference in percentages of fluorine to hydroxyl ions. Three apophyllite minerals have been characterised by thermogravimetric analysis and infrared spectroscopy. Dehydration takes place in several steps. Major mass losses occur at around 205–220 °C and at 400–429 °C. Minor mass losses are observed around 242–292 °C. It is proposed that dehydration occurs in the first decomposition step. Water is lost over the temperature range 125–250, 250–325 and 325–525 °C with the loss of 4.5, 0.5 and 3.0 mol of water. Water functions as zeolitic water and is also coordinated to the silica surfaces.
Resumo:
Alcohol-related mortality and morbidity represents a substantial financial burden to communities across the world. In Australia, conservative estimates place the societal cost (2004-2005) for alcohol abuse at approximately 15.3 billion dollar annually (Collins & Lapsley, 2008). Research has found that adolescence and young adulthood is a peak period for heavy episodic alcohol consumption, with over a third of all people aged 14-19 years having been at risk for acute alcohol-related harm at least once in the prior 12 months (Australian Institute of Health and Welfare [AIHW], (2008). While excessive alcohol consumption has, for a long time, been seen as a male problem; there has been a gradual shift towards a social acceptance of female drinking which has resulted in a diminishing gap in drinking quantity and style between men and women (Roche & Deehan, 2002). There is substantial evidence that women are at higher risk than men for detrimental physical, medical, social and psychological effects of at-risk alcohol consumption (Epstein, et al., 2007). Research outlining the epidemiology of women’s substance use emphasises the need for further examination into influences that may be gender specific and culturally defined (Matheson, 2008; Measham & Ostergaard, 2009). As such, there is a need to utilise female perspectives in examining alcohol consumption and alcohol related problems in order to reflect a more balanced and competent version of drinking in today’s culture (Allamani, 2008). Currently a number of reasons are offered to explain the observed trends including reduction in traditional sanctions and social norms against women drinking, financial emancipation, cultural shift and targeted advertising to name a few. However, there is yet comparatively little research examining drinking by young women in order to understand this ‘new’ drinking pattern. Most research into alcohol use and subsequent intervention and prevention campaigns have been based on male perceptions and constructs of drinking. While such approaches have provided important information regarding the quantity and frequency of alcohol consumption by women, they do not address the important question of why. To understand the why, research needs to explore the difference between males and females in the meaning of the behaviour and the place that drinking holds to them.
Resumo:
Corporate scandals are as old as the corporate form itself. Consider, for example, the controversies surrounding the role of one of the first modern corporations, the British East India Company, in the Bengal famine of 1770 and in the Chinese opium trade. Yet it is the increasing scale and scope of unethical acts carried out by individuals in the name, and interests, of corporations that continue to be concerning. Recent revelations surrounding the extent of bribery and covert surveillance used by News Corporation journalists in its British operations continue to shock the world and undermine confidence in that organiszation and journalists in general. Yet despite the systemic nature of many of these unethical activities, corporate leaders generally plead ignorance when transgressions come to light. During the enquity into the News Corporation scandal, Rupert Murdoch, the CEO and chairman, rejected the assertion that he was ultimately 'responsible for this whole fiasco' (House of Commons, 2011, Q.230). Instead, like many corporate leaders before him, Murdoch placed blame on the employees within the newspaper. His responses poses an increasingly important question: Do corporate leaders bear responsibility for the conduct of individuals within a corporation and, if so, why?
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.
Resumo:
The increased adoption of business process management approaches, tools and practices, has led organizations to accumulate large collections of business process models. These collections can easily include hundred to thousand models, especially in the context of multinational corporations or as a result of organizational mergers and acquisitions. A concrete problem is thus how to maintain these large repositories in such a way that their complexity does not hamper their practical usefulness as a means to describe and communicate business operations. This paper proposes a technique to automatically infer suitable names for business process models and fragments thereof. This technique is useful for model abstraction scenarios, as for instance when user-specific views of a repository are required, or as part of a refactoring initiative aimed to simplify the repository’s complexity. The technique is grounded in an adaptation of the theory of meaning to the realm of business process models. We implemented the technique in a prototype tool and conducted an extensive evaluation using three process model collections from practice and a case study involving process modelers with different experience.
Resumo:
At NTCIR-10 we participated in the cross-lingual link discovery (CrossLink-2) task. In this paper we describe our systems for discovering cross-lingual links between the Chinese, Japanese, and Korean (CJK) Wikipedia and the English Wikipedia. The evaluation results show that our implementation of the cross-lingual linking method achieved promising results.
Resumo:
Hitherto, the Malaconothridae contained Malaconothrus Berlese, 1904 and Trimalaconothrus Berlese, 1916, defined by the possession of one pre-tarsal claw (monodactyly) or by three claws (tridactyly) respectively. However, monodactyly is a convergent apomorphy within the Oribatida and an unreliable character for a classification. Therefore we undertook a phylogenetic analysis of 102 species as the basis for a taxonomic review of the Malaconothridae. We identified two major clades, equivalent to the genera Tyrphonothrus Knülle, 1957 and Malaconothrus. These genera are redefined. Trimala-conothrus becomes the junior subjective synonym of Malaconothrus. Some 42 species of Trimalaconothrus are recom-bined to Malaconothrus and 15 species to Tyrphonothrus. Homonyms created by the recombinations are rectified. The replacement name M. hammerae nom. nov. is proposed for M. angulatus Hammer, 1958, the junior homonym of M. an-gulatus (Willmann, 1931) and the replacement name M. luxtoni nom. nov. is proposed for M. scutatus Luxton, 1987, the junior homonym of M. scutatus Mihelč ič, 1959. Trimalaconothrus iteratus Subías, 2004 is an unnecessary replacement name and is a junior objective synonym of Malaconothrus longirostrum (Hammer 1966). Malaconothrus praeoccupatus Subías, 2004 is a junior objective synonym of M. machadoi Balogh & Mahunka, 1969. Malaconothrus obsessus (Subías, 2004), an unnecessary replacement name for Trimalaconothrus albulus Hammer 1966 sensu Tseng 1982, becomes an available name for what is in fact a previously-undescribed species of Malaconothrus. We describe four new species of Tyrphonothrus: T. gnammaensis sp. nov. from Western Australia, T. gringai sp. nov. and T. maritimus sp. nov. from New South Wales, and T. taylori sp. nov. from Queensland. We describe six new species of Malaconothrus: M. beecroftensis sp. nov., M. darwini sp. nov. M. gundungurra sp. nov. and M. knuellei sp. nov. from New South Wales, M. jowettae sp. nov. from Norfolk Island, and M. talaitae sp. nov. from Victoria.
Resumo:
Democratic governments raise taxes and charges and spend revenue on delivering peace, order and good government. The delivery process begins with a legislature as that can provide a framework of legally enforceable rules enacted according to the government’s constitution. These rules confer rights and obligations that allow particular people to carry on particular functions at particular places and times. Metadata standards as applied to public records contain information about the functioning of government as distinct from the non-government sector of society. Metadata standards apply to database construction. Data entry, storage, maintenance, interrogation and retrieval depend on a controlled vocabulary needed to enable accurate retrieval of suitably catalogued records in a global information environment. Queensland’s socioeconomic progress now depends in part on technical efficiency in database construction to address queries about who does what, where and when; under what legally enforceable authority; and how the evidence of those facts is recorded. The Survey and Mapping Infrastructure Act 2003 (Qld) addresses technical aspects of where questions – typically the officially recognised name of a place and a description of its boundaries. The current 10-year review of the Survey and Mapping Regulation 2004 provides a valuable opportunity to consider whether the Regulation makes sense in the context of a number of later laws concerned with management of Public Sector Information (PSI) as well as policies for ICT hardware and software procurement. Removing ambiguities about how official place names are to be regarded on a whole-of-government basis can achieve some short term goals. Longer-term goals depend on a more holistic approach to information management – and current aspirations for more open government and community engagement are unlikely to occur without such a longer-term vision.
Resumo:
Sandy soils have low nutrient holding capacity and high water conductivity. Consequently, nutrients applied as highly soluble chemical fertilisers are prone to leaching, particularly in heavily irrigated environments such as horticultural soils and golf courses. Amorphous derivatives of kaolin with high cation exchange capacity may be loaded with desired nutrients and applied as controlledrelease fertilisers. Kaolin is an abundant mineral, which can be converted to a meso-porous amorphous derivative (KAD) using facile chemical processes. KAD is currently being used to sequester ammonium from digester effluent in sewage treatment plants in a commercial environment. This material is also known in Australia by the trade name MesoLite. The ammonium-saturated form of KAD may be applied to soils as a nitrogen fertiliser. Up to 7% N can be loaded onto KAD by contacting it with high-ammonia concentration wastewater from sewerage treatment plants. This poster paper demonstrates plant uptake of nitrogen from KAD and compares its efficiency as a fertiliser with NH4SO4. Rye grass was grown in 1kg pots in a glass-house. Nitrogen was applied at a range of rates using NH4SO4 and two KAD materials carrying 7% and 3% nitrogen, respectively. All other nutrients were applied in adequate amounts. All treatments were replicated three times. Plants were harvested after four weeks. Dry mass and N concentrations were determined by standard methods. At all N application rates, ammonium-loaded KAD produced significantly higher plant mass than for NH4SO4. The lower fertiliser effectiveness of NH4SO4 is attributed to possible loss of some N through volatilisation. Of the two KAD types, the material with lower CEC value supported slightly higher plant yields. The KAD materials did not show any adverse effect on availability of trace elements, as evidenced by lack of deficiency symptoms and plant analyses. Clearly, nitrogen loaded on to KAD in the form of ammonium is likely to be protected from leaching, but is still available to plants. These data suggest that KAD-based fertilisers may be suitable substitutes for water soluble N, K and other cation fertilisers for leaching soils.
Resumo:
Research and practice has observed a shift toward service-oriented approaches that depend on input from users and community as co-producers of services. Yet, in delivering public infrastructure the focus is still on assets rather than services. The contribution of external stakeholders in the co-production of public services is still limited. Using the Policy Delphi with a panel of experts, we found that although practitioners understand the need for asset management to follow the service approach, guidelines and policies still lack that service-centric perspective. Findings revealed a range of obstacles to effective service delivery, related to the sub-optimal involvement of stakeholders’, asymmetric levels of power, the lack of accountability, transparency and availability of government, and the lack of genuine consultations between government and stakeholder groups. The paper concludes by offering directions and strategies for asset managers and policymakers to support and reconnect disengaged government-citizen relations for optimal service delivery outcomes in asset management.
Resumo:
With this special issue, we draw attention to the growing and diverse field of HCI researchers exploring the interstices of food, technology and everyday practices. This special issue builds on the CHI workshop of the same name (Comber et al., 2012a), where we brought together the community of researchers that take food as a point from which to understand people and design technology. The workshop aimed to ‘to attend to the practical and theoretical difficulties in designing for human–food interactions in everyday life’ identifying four thematic areas of food practices – health and wellbeing; sustainability; food experiences; and alternative food cultures. These practical and theoretical difficulties are evident in the papers that we present here, though the distinction between our four themes, premised by complexities of food practices, is a little less evident. Thus, in the papers that follow we explore how the social, technological, cultural and methodological intertwine in the field of human–food interaction.
Resumo:
This paper examines the rise in the politicisation of Islam in Malaysia and links it to the othering of the Malaysian Malay. It is my argument that both were “conquering” tools of Malaysia’s “Father of Modernisation”, Mahathir Mohamad, devised to win the support of the Malay Muslim majority in Malaysia. The many awards bestowed on Mahathir obscure the fact that he was instrumental in the systematic erosion of the power and roles of state institutions, especially at the Federal government level. This includes the significant loss of the independence of the Malaysian judiciary. Whilst per capita income in Malaysia may well have increased eight times under his 22-year leadership, this paper asks why is it that the majority of the Malays remain the largest number among the poor and the more disenfranchised of ethnicities in the country? Why have Malay and Muslim women suffered such a rapid decreasing ability to access justice? This paper examines existing research on the social and political changes Malaysia has experienced with Islamisation and under Mahathir’s rule, as well as studies on Malayness, Malay nationalism and Muslim Malay identity formation. The paper elaborates the othering of a majority people, the Malays in Malaysia, and how this othering has brought forth a fast-growing political power in the name of a supremacist Islam, a puritanical Sunni and Malay Islam. Specific events in the rise and rule of Mahathir as Malaysia’s then Prime Minister are reviewed, such as the banning of The Malay Dilemma, and the split in the United Malays National Organisation (UMNO) in 1987. Also examined is the varying emphasis between Muslim and race, and how during Mahathir’s rule, that strong misogynist and patriarchal attitudes took hold in Malay Muslim consciousness, a colonising consciousness that is othering the perceived cultural and genetic “impurities” within the Malay.