381 resultados para Run
Resumo:
In this paper we argue that intentional curriculum design in the first year of law should encourage law students to develop an emergent sense of a positive professional identity. When first year law students engage with a nascent notion of a positive professional identity, their well-being is supported because their studies are informed and contextualised by a sense of purpose for their future professional life. In a first year law subject run for the first time at the QUT Law School in 2011, reflective practice was successfully used to achieve these goals. The paper discusses the subject, the opportunity of using reflective practice to teach a positive sense of professional identity, and some student perspectives on the subject’s design.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
This paper considers VECMs for variables exhibiting cointegration and common features in the transitory components. While the presence of cointegration between the permanent components of series reduces the rank of the long-run multiplier matrix, a common feature among the transitory components leads to a rank reduction in the matrix summarizing short-run dynamics. The common feature also implies that there exists linear combinations of the first-differenced variables in a cointegrated VAR that are white noise and traditional tests focus on testing for this characteristic. An alternative, however, is to test the rank of the short-run dynamics matrix directly. Consequently, we use the literature on testing the rank of a matrix to produce some alternative test statistics. We also show that these are identical to one of the traditional tests. The performance of the different methods is illustrated in a Monte Carlo analysis which is then used to re-examine an existing empirical study. Finally, this approach is applied to provide a check for the presence of common dynamics in DSGE models.
Resumo:
Navigation through tessellated solids in GEANT4 can degrade computational performance, especially if the tessellated solid is large and is comprised of many facets. Redefining a tessellated solid as a mesh of tetrahedra is common in other computational techniques such as finite element analysis as computations need only consider local tetrahedrons rather than the tessellated solid as a whole. Here within we describe a technique that allows for automatic tetrahedral meshing of tessellated solids in GEANT4 and the subsequent loading of these meshes as assembly volumes; loading nested tessellated solids and tetrahedral meshes is also examined. As the technique makes the geometry suitable for automatic optimisation using smartvoxels, navigation through a simple tessellated volume has been found to be more than two orders of magnitude faster than that through the equivalent tessellated solid. Speed increases of more than two orders of magnitude were also observed for a more complex tessellated solid with voids and concavities. The technique was benchmarked for geometry load time, simulation run time and memory usage. Source code enabling the described functionality in GEANT4 has been made freely available on the Internet.
Resumo:
Purpose: The management of unruptured aneurysms remains controversial as treatment infers potential significant risk to the currently well patient. The decision to treat is based upon aneurysm location, size and abnormal morphology (e.g. bleb formation). A method to predict bleb formation would thus help stratify patient treatment. Our study aims to investigate possible associations between intra-aneurysmal flow dynamics and bleb formation within intracranial aneurysms. Competing theories on aetiology appear in the literature. Our purpose is to further clarify this issue. Methodology: We recruited data from 3D rotational angiograms (3DRA) of 30 patients with cerebral aneurysms and bleb formation. Models representing aneurysms pre-bleb formation were reconstructed by digitally removing the bleb, then computational fluid dynamics simulations were run on both pre and post bleb models. Pulsatile flow conditions and standard boundary conditions were imposed. Results: Aneurysmal flow structure, impingement regions, wall shear stress magnitude and gradients were produced for all models. Correlation of these parameters with bleb formation was sought. Certain CFD parameters show significant inter patient variability, making statistically significant correlation difficult on the partial data subset obtained currently. Conclusion: CFD models are readily producible from 3DRA data. Preliminary results indicate bleb formation appears to be related to regions of high wall shear stress and direct impingement regions of the aneurysm wall.
Resumo:
In Australia, railway systems play a vital role in transporting the sugarcane crop from farms to mills. The sugarcane transport system is very complex and uses daily schedules, consisting of a set of locomotives runs, to satisfy the requirements of the mill and harvesters. The total cost of sugarcane transport operations is very high; over 35% of the total cost of sugarcane production in Australia is incurred in cane transport. Efficient schedules for sugarcane transport can reduce the cost and limit the negative effects that this system can have on the raw sugar production system. There are several benefits to formulating the train scheduling problem as a blocking parallel-machine job shop scheduling (BPMJSS) problem, namely to prevent two trains passing in one section at the same time; to keep the train activities (operations) in sequence during each run (trip) by applying precedence constraints; to pass the trains on one section in the correct order (priorities of passing trains) by applying disjunctive constraints; and, to ease passing trains by solving rail conflicts by applying blocking constraints and Parallel Machine Scheduling. Therefore, the sugarcane rail operations are formulated as BPMJSS problem. A mixed integer programming and constraint programming approaches are used to describe the BPMJSS problem. The model is solved by the integration of constraint programming, mixed integer programming and search techniques. The optimality performance is tested by Optimization Programming Language (OPL) and CPLEX software on small and large size instances based on specific criteria. A real life problem is used to verify and validate the approach. Constructive heuristics and new metaheuristics including simulated annealing and tabu search are proposed to solve this complex and NP-hard scheduling problem and produce a more efficient scheduling system. Innovative hybrid and hyper metaheuristic techniques are developed and coded using C# language to improve the solutions quality and CPU time. Hybrid techniques depend on integrating heuristic and metaheuristic techniques consecutively, while hyper techniques are the complete integration between different metaheuristic techniques, heuristic techniques, or both.
Resumo:
A core component for the prevention of re-occurring incidents within the rail industry is rail safety investigations. Within the current Australasian rail industry, the nature of incident investigations varies considerably between organisations. As it stands, most of the investigations are conducted by the various State Rail Operators and Regulators, with the more major investigations in Australia being conducted or overseen by the Australian Transport Safety Bureau (ATSB). Because of the varying nature of these investigations, the current training methods for rail incident investigators also vary widely. While there are several commonly accepted training courses available to investigators in Australasia, none appear to offer the breadth of development needed for a comprehensive pathway. Furthermore, it appears that no single training course covers the entire breadth of competencies required by the industry. These courses range in duration between a few days to several years, and some were run in-house while others are run by external consultants or registered training organisations. Through consultations with rail operators and regulators in Australasia, this paper will identify capabilities required for rail incident investigation and explore the current training options available for rail incident investigators.
Resumo:
Crop simulation models have the potential to assess the risk associated with the selection of a specific N fertilizer rate, by integrating the effects of soil-crop interactions on crop growth under different pedo-climatic and management conditions. The objective of this study was to simulate the environmental and economic impact (nitrate leaching and N2O emissions) of a spatially variable N fertilizer application in an irrigated maize field in Italy. The validated SALUS model was run with 5 nitrogen rates scenarios, 50, 100, 150, 200, and 250 kg N ha−1, with the latter being the N fertilization adopted by the farmer. The long-term (25 years) simulations were performed on two previously identified spatially and temporally stable zones, a high yielding and low yielding zone. The simulation results showed that N fertilizer rate can be reduced without affecting yield and net return. The marginal net return was on average higher for the high yield zone, with values ranging from 1550 to 2650 € ha−1 for the 200 N and 1485 to 2875 € ha−1 for the 250 N. N leaching varied between 16.4 and 19.3 kg N ha−1 for the 200 N and the 250 N in the high yield zone. In the low yield zone, the 250 N had a significantly higher N leaching. N2O emissions varied between 0.28 kg N2O ha−1 for the 50 kg N ha−1 rate to a maximum of 1.41 kg N2O ha−1 for the 250 kg N ha−1 rate.
Resumo:
Here we present a sequential Monte Carlo approach to Bayesian sequential design for the incorporation of model uncertainty. The methodology is demonstrated through the development and implementation of two model discrimination utilities; mutual information and total separation, but it can also be applied more generally if one has different experimental aims. A sequential Monte Carlo algorithm is run for each rival model (in parallel), and provides a convenient estimate of the marginal likelihood (of each model) given the data, which can be used for model comparison and in the evaluation of utility functions. A major benefit of this approach is that it requires very little problem specific tuning and is also computationally efficient when compared to full Markov chain Monte Carlo approaches. This research is motivated by applications in drug development and chemical engineering.
Resumo:
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.
Resumo:
According to Tan et al. (2011), the establishment of a clear sustainability policy in the construction industry is paramount, if only as a statement of the commitment of the top management to protecting the environment and enhancing social responsibility. The resulting policies should then translate into proactive strategies and action plans that improve the sustainability performance of contractors and provide a competitive advantage by integrating “long-run profitability” with sustainable development efforts. The strategies should also take into account climatic protection issues through greenhouse gas emissions (GHGe) monitoring and reduction initiatives (Stocker & Luptacik, 2009)...
Resumo:
This conceptual paper explores the extent to which reported accounting information captures unique family firm decision-making and intangible asset factors that impact financial value. We review the family firm valuation-relevant literature and identify that this body of research is predicated on the assumption that accounting information reflects the underlying reality of family firms. This research, however, fails to recognise that current accounting technology does not fully recognise the family firm factors in the book value of the firm or the implications for long run persistence of earnings. Thus, valuation models underpinning the extant empirical research, which are predicated on reported accounting information, may not fully reflect the intrinsic value of family firms. We present propositions on the interaction between accounting information, family factors and valuation as a road map for future empirical research with a discussion of appropriate methodologies.
Resumo:
Introduction: Food insecurity is a social determinant of health and is defined as limited ability to access sufficient amounts of nutritionally adequate or safe food for a healthy and active life. Food insecurity is associated with poor health status and the exacerbation of other health inequalities. This study examined whether an association existed between 1) socioeconomic position (SEP) and food insecurity and 2) food insecurity and weight status. Methods: Data from the 1995 National Nutrition Survey was analysed. A random sample of households (n = 13 858) were asked about dietary habits and food choices. Information about gender, age, BMI, waist circumference, household income and whether the household had run out of money to purchase food in the previous 12 months was obtained and analysed using chi-square and logistic regression. Results: Income was significantly associated with food insecurity; households with lower income were at higher risk of food insecurity. Lower income males were nine times more likely to experience food insecurity and lower income females were three times more likely to experience food insecurity than their higher income counterparts. Food insecurity was significantly associated with body mass index (BMI) among women but not men. Women experiencing food insecurity were at higher risk of overweight/obesity according to BMI and waist circumference measures. Conclusion: Evidence suggests that low income households are at higher risk of food insecurity and women who are food insecure are at higher risk of being overweight or obese. Food insecurity may mediate the association between SEP and BMI.
Resumo:
Introduction: Food insecurity is a social determinant of health and is defined as limited ability to access sufficient amounts of nutritionally adequate or safe food for a healthy and active life. Food insecurity is associated with poor health status and the exacerbation of other health inequalities. This study examined whether an association existed between 1) socioeconomic position (SEP) and food insecurity and 2) food insecurity and weight status. Methods: Data from the 1995 National Nutrition Survey was analysed. A random sample of households (n = 13 858) were asked about dietary habits and food choices. Information about gender, age, BMI, waist circumference, household income and whether the household had run out of money to purchase food in the previous 12 months was obtained and analysed using chi-square and logistic regression. Results: Income was significantly associated with food insecurity; households with lower income were at higher risk of food insecurity. Lower income males were nine times more likely to experience food insecurity and lower income females were three times more likely to experience food insecurity than their higher income counterparts. Food insecurity was significantly associated with body mass index (BMI) among women but not men. Women experiencing food insecurity were at higher risk of overweight/obesity according to BMI and waist circumference measures. Conclusion: Evidence suggests that low income households are at higher risk of food insecurity and women who are food insecure are at higher risk of being overweight or obese. Food insecurity may mediate the association between SEP and BMI.
Resumo:
Recent attention in education within many western contexts has focused on improved outcomes for students, with a particular focus on closing the gap between those who come from disadvantaged backgrounds and the rest of the student population. Much of this attention has supported a set of simplistic solutions to improving scores on high stakes standardized tests. The collateral damage (Nichols & Berliner, 2007) of such responses includes a narrowing of the curriculum, plateaus in gain scores on the tests, and unproductive blame games aimed by the media and politicians at teachers and communities (Nichols & Berliner, 2007; Synder, 2008). Alternative approaches to improving the quality and equity of schooling remain as viable alternatives to these measures. As an example in a recent study of school literacy reform in low SES schools, Luke, Woods and Dooley (2011) argued for the increase of substantive content and intellectual quality of the curriculum as a necessary means to re-engaging middle school students, improving outcomes of schooling and achieving a high quality, high equity system. The MediaClub is an afterschool program for students in years 4 to 7 (9-12 year old) at a primary school in a low SES area of a large Australian city. It is run as part of an Australian Research Council funded research project. The aim of the program has been to provide an opportunity for students to gain expertise in digital technologies and media literacies in an afterschool setting. It was hypothesized that this expertise might then be used to shift the ways of being literate that these students had to call on within classroom teaching and learning events. Each term, there is a different focus on digital media, and information and communication technology (ICT) activities in the MediaClub. The work detailed in this chapter relates to a robotics program presented as one of the modules within this afterschool setting. As part of the program, the participants were challenged to find creative solutions to problems in a constructivist-learning environment.