255 resultados para I A Richards


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Governments are challenged by the need to ensure that ageing populations stay active and engaged as they age. Therefore, it is critical to investigate the role of mobility in older people's engagement in out-of-home activities, and to identify the experiences they have within their communities. This research investigates the use of transportation by older people and its implications for their out-of-home activities within suburban environments. The qualitative, mixed-method approach employs data collection methods which include a daily travel diary (including a questionnaire), Global Positioning System (GPS) tracking and semi-structured interviews with older people living in suburban environments in Brisbane, Australia. Results show that older people are mobile throughout the city, and their car provides them with that opportunity to access desired destinations. This ability to drive allows older people to live independently and to assist others who do not drive, particularly where transport alternatives are not as accessible. The ability to transport goods and other people is a significant advantage of the private car over other transport options. People with no access to private transportation who live in low-density environments are disadvantaged when it comes to participation within the community. Further research is needed to better understand the relationship between transportation and participation within the community environment, to assist policy makers and city and transportation planners to develop strategies for age-friendly environments within the community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Arid systems are markedly different from non-arid systems. This distinctiveness extends to arid-social networks, by which we mean social networks which are influenced by the suite of factors driving arid and semi-arid regions. Neither the process of how aridity interacts with social structure, nor what happens as a result of this interaction, is adequately understood. This paper postulates three relative characteristics which make arid-social networks distinct: that they are tightly bound, are hierarchical in structure and, hence, prone to power abuses, and contain a relatively higher proportion of weak links, making them reactive to crisis. These ideas were modified from workshop discussions during 2006. Although they are neither tested nor presented as strong beliefs, they are based on the anecdotal observations of arid-system scientists with many years of experience. This paper does not test the ideas, but rather examines them in the context of five arid-social network case studies with the aim of hypotheses building. Our cases are networks related to pastoralism, Aboriginal outstations, the ‘Far West Coast Aboriginal Enterprise Network’ and natural resources in both the Lake-Eyre basin and the Murray–Darling catchment. Our cases highlight that (1) social networks do not have clear boundaries, and that how participants perceive their network boundaries may differ from what network data imply, (2) although network structures are important determinants of system behaviour, the role of participants as individuals is still pivotal, (3) and while in certain arid cases weak links are engaged in crisis, the exact structure of all weak links in terms of how they place participants in relation to other communities is what matters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Located at the intersection of two vulnerable groups in the contemporary labour market, young people who migrate as refugees during adolescence face a unique constellation of opportunities and challenges that shape their employment trajectories. Yet the tendency for research to focus on the early years of refugee settlement means that we have an inadequate understanding the factors that mediate their employment decisions, experiences and outcomes. Based on interviews with 51 young people, this article explores how aspirations, responsibilities, family, education and networks are understood to influence the employment trajectories of adolescent refugee migrants. While this article draws attention to the complex and dynamic range of challenges and constraints that these young people negotiate in the pursuit of satisfying and sustainable employment, what also emerges is an optimistic and determined cohort who, even as they at times unsuccessfully prepare for and navigate the labour market, maintain high hopes for a better life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scientific job market has evolved to a truly globalized market. This is epitomized not only by the English language being the de facto scientific language but also by the increasing share of native language journals that are being offered in multiple languages or have or will fully converted to English (such as, for example, the BISE journal in 2015). Similarly, a plethora of exchange programs exists that allow students and academic staff to visit other institutions and exchange knowledge, ideas, and learning opportunities. While student migration across scientific institutions is an established phenomenon (Gribble, 2008) with ample structures, policies, and schemes such as ERASMUS1 in place, academic staff migration between countries is still a challenge, even if exchange programs exist (Enders, 1998). One reason may be that different career paths, varying teaching loads and different evaluation schemes for what constitutes scientific excellence are notable. This also influences the decision of where to start and continue an academic career. While the university systems themselves have been examined previously (Galliers and Whitley, 2007; Lyytinen et al., 2007) and while there is knowledge about career requirements in different university systems (Dennis et al., 2006; Dean et al., 2011; Loos et al., 2013; Recker, 2013), we still do not know much about individual and contextual decisions of academics that either consider or execute a migration between university systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background. Volitional risky driving behaviours such as drink- and drug-driving (i.e. substance-impaired driving) and speeding contribute to the overrepresentation of young novice drivers in road crash fatalities, and crash risk is greatest during the first year of independent driving in particular. Aims. To explore the: 1) self-reported compliance of drivers with road rules regarding substance-impaired driving and other risky driving behaviours (e.g., speeding, driving while tired), one year after progression from a Learner to a Provisional (intermediate) licence; and 2) interrelationships between substance-impaired driving and other risky driving behaviours (e.g., crashes, offences, and Police avoidance). Methods. Drivers (n = 1,076; 319 males) aged 18-20 years were surveyed regarding their sociodemographics (age, gender) and self-reported driving behaviours including crashes, offences, Police avoidance, and driving intentions. Results. A relatively small proportion of participants reported driving after taking drugs (6.3% of males, 1.3% of females) and drinking alcohol (18.5% of males, 11.8% of females). In comparison, a considerable proportion of participants reported at least occasionally exceeding speed limits (86.7% of novices), and risky behaviours like driving when tired (83.6% of novices). Substance-impaired driving was associated with avoiding Police, speeding, risky driving intentions, and self-reported crashes and offences. Forty-three percent of respondents who drove after taking drugs also reported alcohol-impaired driving. Discussion and Conclusions. Behaviours of concern include drink driving, speeding, novice driving errors such as misjudging the speed of oncoming vehicles, violations of graduated driver licensing passenger restrictions, driving tired, driving faster if in a bad mood, and active punishment avoidance. Given the interrelationships between the risky driving behaviours, a deeper understanding of influential factors is required to inform targeted and general countermeasure implementation and evaluation during this critical driving period. Notwithstanding this, a combination of enforcement, education, and engineering efforts appear necessary to improve the road safety of the young novice driver, and for the drink-driving young novice driver in particular.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design activities of the development of the SCRAMSPACE I scramjet-powered free-flight experiment are described in this paper. The objectives of this flight are first described together with the definition of the primary, secondary and tertiary experiments. The Scramjet configuration studied is first discussed together with the rocket motor system selected for this flight. The different flight sequences are then explained, highlighting the SCRAMSPACE I free-flyer separation and re-orientation procedures. A design trade-off study is then described considering vehicle stability, packaging, thermo-structural analysis and trajectory, discussing the alignment of the predicted performance with the mission scientific requirements. The global system architecture and instrumentation of the vehicle are then explained. The conclusions of this design phase are that a vehicle design has been produced which is able to meet the mission scientific goals and the procurement & construction of the vehicle are ongoing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current research extends our knowledge of the main effects of attitude, subjective norm, and perceived control over the individual’s technology adoption. We propose a critical buffering role of social influence on the collectivistic culture in the relationship between attitude, perceived behavioral control, and Information Technology (IT) adoption. Adoption behavior was studied among 132 college students being introduced to a new virtual learning system. While past research mainly treated these three variables as being in parallel relationships, we found a moderating role for subjective norm on technology attitude and perceived control on adoption intent. Implications and limitations for understating the role of social influence in the collectivistic society are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unsaturated water flow in soil is commonly modelled using Richards’ equation, which requires the hydraulic properties of the soil (e.g., porosity, hydraulic conductivity, etc.) to be characterised. Naturally occurring soils, however, are heterogeneous in nature, that is, they are composed of a number of interwoven homogeneous soils each with their own set of hydraulic properties. When the length scale of these soil heterogeneities is small, numerical solution of Richards’ equation is computationally impractical due to the immense effort and refinement required to mesh the actual heterogeneous geometry. A classic way forward is to use a macroscopic model, where the heterogeneous medium is replaced with a fictitious homogeneous medium, which attempts to give the average flow behaviour at the macroscopic scale (i.e., at a scale much larger than the scale of the heterogeneities). Using the homogenisation theory, a macroscopic equation can be derived that takes the form of Richards’ equation with effective parameters. A disadvantage of the macroscopic approach, however, is that it fails in cases when the assumption of local equilibrium does not hold. This limitation has seen the introduction of two-scale models that include at each point in the macroscopic domain an additional flow equation at the scale of the heterogeneities (microscopic scale). This report outlines a well-known two-scale model and contributes to the literature a number of important advances in its numerical implementation. These include the use of an unstructured control volume finite element method and image-based meshing techniques, that allow for irregular micro-scale geometries to be treated, and the use of an exponential time integration scheme that permits both scales to be resolved simultaneously in a completely coupled manner. Numerical comparisons against a classical macroscopic model confirm that only the two-scale model correctly captures the important features of the flow for a range of parameter values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trichoderma reesei Rut-C30 is used widely as an expression host for various gene products. We have explored cellular effects caused by the expression of a mutant form of cellobiohydrolase I (CBHI), the major secreted protein of T. reesei using biochemical and transcriptomic analyses and confocal laser scanning microscopy. The mutated CBHI was tagged fluorescently with Venus to establish the subcellular location of the fusion protein and its potential association with the proteasome, an organelle assigned for the disposal of misfolded proteins. Expression of the mutant CBHI in the high protein-secreting host Rut-C30 caused physiological changes in the fungal hyphae, affected protein secretion and elicited ER stress. A massive upregulation of UPR- and ERAD-related genes sec61, der1, uba1, bip1, pdi1, prp1, cxl1 and lhs1 was observed by qRT-PCR in the CBHIΔ4-Venus strain with four mutations introduced in the DNA encoding the core domain of CBHI. Further stress was applied to this strain by inhibiting function of the proteasome with MG132 (N-benzoylcarbonyl(Cbz)-Leu-Leu-leucinal). The effect of MG132 was found to be specific to the proteasome-associated genes. There are no earlier reports on the effect of proteasome inhibition on protein quality control in filamentous fungi. Confocal fluorescence microscopy studies suggested that the mutant CBHI accumulated in the ER and colocalized with the fungal proteasome. These results provide an indication that there is a limit to how far T. reesei Rut-C30, already under secretion stress, can be pressed to produce higher protein yields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the challenges of writing and publishing faced by Indigenous women who work in the Australian higher education sector. It demonstrates that Indigenous women are under-represented in the academy and argues that Indigenous styles of writing are typically not valued for broader publication. The authors describe a writing mentoring and support program specifically developed for Indigenous academic women in Australia. The Tiddas Writin’ Up Workshop provided a safe and culturally-appropriate space for women to learn about academic writing and develop their writing skills. The workshop led to the publication of a special issue of the Journal of Australian Indigenous Issues – known as the Tiddas Collection. The authors highlight the power and strength of well-developed support programs to address skills development, confidence, inequities and under-representation of Indigenous women within the higher education workforce.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been 21 years since the decision in Rogers v Whitaker and the legal principles concerning informed consent and liability for negligence are still strongly grounded in this landmark High Court decision. This paper considers more recent developments in the law concerning the failure to disclose inherent risks in medical procedures, focusing on the decision in Wallace v Kam [2013] HCA 19. In this case, the appellant underwent a surgical procedure that carried a number of risks. The surgery itself was not performed in a sub-standard way, but the surgeon failed to disclose two risks to the patient, a failure that constituted a breach of the surgeon’s duty of care in negligence. One of the undisclosed risks was considered to be less serious than the other, and this lesser risk eventuated causing injury to the appellant. The more serious risk did not eventuate, but the appellant argued that if the more serious risk had been disclosed, he would have avoided his injuries completely because he would have refused to undergo the procedure. Liability was disputed by the surgeon, with particular reference to causation principles. The High Court of Australia held that the appellant should not be compensated for harm that resulted from a risk he would have been willing to run. We examine the policy reasons underpinning the law of negligence in this specific context and consider some of the issues raised by this unusual case. We question whether some of the judicial reasoning adopted in this case, represents a significant shift in traditional causation principles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Both the integrin and insulin-like growth factor binding protein (IGFBP) families independently play important roles in modulating tumor cell growth and progression. We present evidence for a specific cell surface localization and a bimolecular interaction between the αvβ3 integrin and IGFBP-2. The interaction, which could be specifically perturbed using vitronectin and αvβ3 blocking antibodies, was shown to modulate IGF-mediated cellular migration responses. Moreover, this interaction was observed in vivo and correlated with reduced tumor size of the human breast cancer cells, MCF-7β3, which overexpressed the αvβ3 integrin. Collectively, these results indicate that αvβ3 and IGFBP-2 act cooperatively in a negative regulatory manner to reduce tumor growth and the migratory potential of breast cancer cells.