237 resultados para Dominance hierarchy
Resumo:
This thesis developed a condition assessment and rating method to identify those bridges in a network which are in most need of repair for an effective life cycle management. The method estimates the contribution of critical factors towards bridge deterioration and uses structural analysis to overcome the subjectivity of traditional current condition assessment methods. This research was a part of the CRC project titled 'Life Cycle Management of Railway Bridges'. Efficient usage of resources and enhancing the safety and serviceability of railway bridges are the significant outcomes of using the proposed method.
Resumo:
This study will be of interest to anyone concerned with a critical appraisal of mental health service users’ and carers’ participation in research collaboration and with the potential of the postcolonial paradigm of cultural safety to contribute to the service user research (SUR) movement. The history and nature of the mental health field and its relationship to colonial processes provokes a consideration of whether cultural safety could focus attention on diversity, power imbalance, cultural dominance and structural inequality, identified as barriers and tensions in SUR. We consider these issues in the context of state-driven approaches towards SUR in planning and evaluation and the concurrent rise of the SUR movement in the UK and Australia, societies with an intimate involvement in processes of colonisation. We consider the principles and motivations underlying cultural safety and SUR in the context of the policy agenda informing SUR. We conclude that while both cultural safety and SUR are underpinned by social constructionism constituting similarities in principles and intent, cultural safety has additional dimensions. Hence, we call on researchers to use the explicitly political and self-reflective process of cultural safety to think about and address issues of diversity, power and social justice in research collaboration.
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
Two studies documented the “David and Goliath” rule—the tendency for people to perceive criticism of “David” groups (groups with low power and status) as less normatively permissible than criticism of “Goliath” groups (groups with high power and status). The authors confirmed the existence of the David and Goliath rule across Western and Chinese cultures (Study 1). However, the rule was endorsed more strongly in Western than in Chinese cultures, an effect mediated by cultural differences in power distance. Study 2 identified the psychological underpinnings of this rule in an Australian sample. Lower social dominance orientation (SDO) was associated with greater endorsement of the rule, an effect mediated through the differential attribution of stereotypes. Specifically, those low in SDO were more likely to attribute traits of warmth and incompetence to David versus Goliath groups, a pattern of stereotypes that was related to the protection of David groups from criticism.
Resumo:
Existing techniques for automated discovery of process models from event logs gen- erally produce flat process models. Thus, they fail to exploit the notion of subprocess as well as error handling and repetition constructs provided by contemporary process modeling notations, such as the Business Process Model and Notation (BPMN). This paper presents a technique for automated discovery of hierarchical BPMN models con- taining interrupting and non-interrupting boundary events and activity markers. The technique employs functional and inclusion dependency discovery techniques in order to elicit a process-subprocess hierarchy from the event log. Given this hierarchy and the projected logs associated to each node in the hierarchy, parent process and subprocess models are then discovered using existing techniques for flat process model discovery. Finally, the resulting models and logs are heuristically analyzed in order to identify boundary events and markers. By employing approximate dependency discovery tech- niques, it is possible to filter out noise in the event log arising for example from data entry errors or missing events. A validation with one synthetic and two real-life logs shows that process models derived by the proposed technique are more accurate and less complex than those derived with flat process discovery techniques. Meanwhile, a validation on a family of synthetically generated logs shows that the technique is resilient to varying levels of noise.
Resumo:
In this collaborative article, we seek to unsettle the dominance of Western, reconstructionist accounts of Indigenous Australian sport history through reflections on our past research in the Queensland Aboriginal community of Cherbourg. That research focussed on a statue of legendary 1930s cricketer, Eddie Gilbert, and on sport exhibitions in Cherbourg's Ration Shed Museum. Here, we are less concerned with unveiling the ‘true’ account of Australian Aboriginal sporting history, or even a ‘true’ Indigenous representation of events. Rather, we are interested in analysing various perspectives in order to generate a more inclusive and complete account of Aboriginal sport history and the narrative implications of these for Indigenous and non-Indigenous Australia. Central to this endeavour is the positioning of Indigenous knowledge and understanding at the centre of history-making. The article is in two sections: reflections on our past work from the perspectives of the researchers themselves and an Aboriginal academic colleague, followed by a discussion of how those experiences and reflections will inform our pending project on the 1950s and 1960s Cherbourg marching girls teams.
Resumo:
Fluctuations in transit ridership pattern over the year have always concerned transport planners, operators and researchers. Predominantly, metrological elements have been specified to explain variability in ridership volume. However, the outcome of this research points to new direction to explain ridership fluctuation in Brisbane. It explored the relationship between daily bus ridership, seasonality and weather variables for a one-year period, 2012. Rather than segregating the entire year’s ridership into the four calendar seasons (summer, autumn, spring, and winter), this analysis distributed the yearly ridership into nine complex seasonality blocks. These represent calendar season, school/university (academic) period and their corresponding holidays, as well as other observant holidays such as Christmas. The dominance of complex seasonality over typical calendar season was established through analysis and using Multiple Linear Regression (MLR). This research identified a very strong association between complex seasonality and bus ridership. Furthermore, an expectation that Brisbane’s subtropical summer is unfavourable to transit usage was not supported by the findings of this study. A nil association of precipitation and temperature was observed in this region. Finally, this research developed a ridership estimation model, capable of predicting daily ridership within very limited error range. Following the application of this developed model, the estimated annual time series data of each suburb was analysed using Fourier Transformation to appreciate whether any cyclical effects remained, compared with the original data.
Resumo:
Embedded many-core architectures contain dozens to hundreds of CPU cores that are connected via a highly scalable NoC interconnect. Our Multiprocessor-System-on-Chip CoreVAMPSoC combines the advantages of tightly coupled bus-based communication with the scalability of NoC approaches by adding a CPU cluster as an additional level of hierarchy. In this work, we analyze different cluster interconnect implementations with 8 to 32 CPUs and compare them in terms of resource requirements and performance to hierarchical NoCs approaches. Using 28nm FD-SOI technology the area requirement for 32 CPUs and AXI crossbar is 5.59mm2 including 23.61% for the interconnect at a clock frequency of 830 MHz. In comparison, a hierarchical MPSoC with 4 CPU cluster and 8 CPUs in each cluster requires only 4.83mm2 including 11.61% for the interconnect. To evaluate the performance, we use a compiler for streaming applications to map programs to the different MPSoC configurations. We use this approach for a design-space exploration to find the most efficient architecture and partitioning for an application.
Resumo:
Purpose There have been only a limited number of studies examining the accommodative response that occurs when the two eyes are provided with disparate accommodative stimuli, and the results from these studies to date have been equivocal. In this study, we therefore aimed to examine the capacity of the visual system to aniso-accommodate by objectively measuring the interocular difference in the accommodation response between fellow dominant and non-dominant eyes under controlled monocular and binocular viewing conditions during short-term exposure to aniso-accommodative stimuli. Methods The accommodative response of each eye of sixteen young isometropic adults (mean age 22 ± 2 years) with normal binocular vision was measured using an open-field autorefractor during a range of testing conditions; monocularly (accommodative demands ranging from 1.32 to 4.55 D) and binocularly while altering the accommodation demand for each eye (aniso-accommodative stimuli ranging from 0.24 to 2.05 D). Results Under monocular viewing conditions, the dominant and non-dominant eyes displayed a highly symmetric accommodative response; mean interocular difference in spherical equivalent 0.01 ± 0.06 D (relative) and 0.22 ± 0.06 D (absolute) (p>0.05). During binocular viewing, the dominant eye displayed a greater accommodative response (0.11 ± 0.34 D relative and 0.24 ± 0.26 D absolute) irrespective of whether the demand of the dominant or non-dominant eye was altered (p = 0.01). Astigmatic power vectors J0 and J45 did not vary between eyes or with increasing accommodation demands under monocular or binocular viewing conditions (p>0.05). Conclusion The dominant and non-dominant eyes of young isometropic individuals display a similar consensual lag of accommodation under both monocular and binocular viewing conditions, with the dominant eye showing a small but significantly greater (by 0.12 to 0.25 D) accommodative response. Evidence of short-term aniso-accommodation in response to asymmetric accommodation demands was not observed.
Resumo:
This research proposes a multi-dimensional model for Opinion Mining, which integrates customers' characteristics and their opinions about products (or services). Customer opinions are valuable for companies to deliver right products or services to their customers. This research presents a comprehensive framework to evaluate opinions' orientation based on products' hierarchy attributes. It also provides an alternative way to obtain opinion summaries for different groups of customers and different categories of produces.
Resumo:
This paper investigates the reasons why some technologies, defying general expectations and the established models of technological change, may not disappear from the market after having been displaced from their once-dominant status. Our point of departure is that the established models of technological change are not suitable to explain this as they predominantly focus on technological dominance, giving attention to the technologies that display highest performance levels and gain greatest market share. And yet, technological landscapes are rife with technological designs that do not fulfil these conditions. Using the LP record as an empirical case, we propose that the central mechanism at play in the continuing market presence of once-dominant technologies is the recasting of their technological features from the functional-utilitarian to the aesthetic realm, with an additional element concerning communal interaction among users. The findings that emerge from our quantitative textual analysis of over 200,000 posts on a prominent online LP-related discussion forum (between 2002 and 2010) also suggest that the post-dominance technology adopters and users appear to share many key characteristics with the earliest adopters of new technologies, rather than with late-stage adopters which precede them.
Resumo:
Modern non-invasive brain imaging technologies, such as diffusion weighted magnetic resonance imaging (DWI), enable the mapping of neural fiber tracts in the white matter, providing a basis to reconstruct a detailed map of brain structural connectivity networks. Brain connectivity networks differ from random networks in their topology, which can be measured using small worldness, modularity, and high-degree nodes (hubs). Still, little is known about how individual differences in structural brain network properties relate to age, sex, or genetic differences. Recently, some groups have reported brain network biomarkers that enable differentiation among individuals, pairs of individuals, and groups of individuals. In addition to studying new topological features, here we provide a unifying general method to investigate topological brain networks and connectivity differences between individuals, pairs of individuals, and groups of individuals at several levels of the data hierarchy, while appropriately controlling false discovery rate (FDR) errors. We apply our new method to a large dataset of high quality brain connectivity networks obtained from High Angular Resolution Diffusion Imaging (HARDI) tractography in 303 young adult twins, siblings, and unrelated people. Our proposed approach can accurately classify brain connectivity networks based on sex (93% accuracy) and kinship (88.5% accuracy). We find statistically significant differences associated with sex and kinship both in the brain connectivity networks and in derived topological metrics, such as the clustering coefficient and the communicability matrix.
Resumo:
A key feature of the current era of Australian schooling is the dominance of publically available student, school and teacher performance data. Our paper examines the intersection of data on teachers’ postgraduate qualifications and students’ end of schooling outcomes in 26 Catholic Systemic Secondary Schools and 18 Catholic Independent Secondary Schools throughout the State of Queensland. We introduce and justify taking up a new socially-just measurement model of students’ end of schooling outcomes, called the ‘Tracking and Academic Management Index’, otherwise known as ‘TAMI’. Additional analysis is focused on the outcomes of top-end students vis-à-vis all students who are encouraged to remain in institutionalised education of one form or another for the two final years of senior secondary schooling. These findings of the correlations between Catholic teachers’ postgraduate qualifications and students’ end of schooling outcomes are also compared with teachers’ postgraduate qualifications and students’ end of schooling outcomes across 174 Queensland Government Secondary Schools and 58 Queensland Independent Secondary Schools from the same data collection period. The findings raise important questions about the transference of teachers’ postgraduate qualifications for progressing students’ end of schooling outcomes as well as the performance of Queensland Catholic Systemic Secondary Schools and Queensland Catholic Independent Secondary Schools during a particular era of education.
Resumo:
The distribution of a freshwater species is often dependent on its ability to disperse within the riverine system. Species with high dispersal abilities tend to be widespread, whereas those with restricted dispersal tend to be geographically restricted and are usually given higher conservation priority. Population structure was compared between a widespread freshwater prawn species, Macrobrachium australiense, and a narrow-range endemic freshwater prawn, Macrobrachium koombooloomba. The distribution of M. australiense and M. koombooloomba did not overlap, although suggested historical river-boundary rearrangements indicate that there has been the potential for dispersal into neighbouring catchments. A fragment of the mtDNA CO1 gene was analysed and a Mantel test revealed a significant isolation by distance effect for both species. Significant overall FST values confirmed that both species exhibited low levels of dispersal, a prediction for populations inhabiting a fragmented upland environment. The level of structure in M. australiense is surprising for a widely distributed species. Not all M. australiense populations conformed to the stream-hierarchy model, with results being best explained by historical river realignment or cross-catchment dispersal. The fact that both species show limited dispersal highlights the importance of conservation in highland areas for both endemic and widely spread species.
Resumo:
Invasive non-native plants have negatively impacted on biodiversity and ecosystem functions world-wide. Because of the large number of species, their wide distributions and varying degrees of impact, we need a more effective method for prioritizing control strategies for cost-effective investment across heterogeneous landscapes. Here, we develop a prioritization framework that synthesizes scientific data, elicits knowledge from experts and stakeholders to identify control strategies, and appraises the cost-effectiveness of strategies. Our objective was to identify the most cost-effective strategies for reducing the total area dominated by high-impact non-native plants in the Lake Eyre Basin (LEB). We use a case study of the ˜120 million ha Lake Eyre Basin that comprises some of the most distinctive Australian landscapes, including Uluru-Kata Tjuta National Park. More than 240 non-native plant species are recorded in the Lake Eyre Basin, with many predicted to spread, but there are insufficient resources to control all species. Lake Eyre Basin experts identified 12 strategies to control, contain or eradicate non-native species over the next 50 years. The total cost of the proposed Lake Eyre Basin strategies was estimated at AU$1·7 billion, an average of AU$34 million annually. Implementation of these strategies is estimated to reduce non-native plant dominance by 17 million ha – there would be a 32% reduction in the likely area dominated by non-native plants within 50 years if these strategies were implemented. The three most cost-effective strategies were controlling Parkinsonia aculeata, Ziziphus mauritiana and Prosopis spp. These three strategies combined were estimated to cost only 0·01% of total cost of all the strategies, but would provide 20% of the total benefits. Over 50 years, cost-effective spending of AU$2·3 million could eradicate all non-native plant species from the only threatened ecological community within the Lake Eyre Basin, the Great Artesian Basin discharge springs. Synthesis and applications. Our framework, based on a case study of the ˜120 million ha Lake Eyre Basin in Australia, provides a rationale for financially efficient investment in non-native plant management and reveals combinations of strategies that are optimal for different budgets. It also highlights knowledge gaps and incidental findings that could improve effective management of non-native plants, for example addressing the reliability of species distribution data and prevalence of information sharing across states and regions.