294 resultados para Norm-Divergence
Resumo:
The term ‘two cultures’ was coined more than 50 years ago by scientist and novelist C.P. Snow to describe the divergence in the world views and methods of scientists and the creative sector. This divergence has meant that innovation systems and policies have focused for decades on science, engineering, technology and medicine and the industries that depend on them. The humanities, arts and social sciences have been bit players at best; their contributions hidden from research agendas, policy and program initiatives, and the public mind. But structural changes to advanced economies and societies have brought services industries and the creative sector to greater prominence as key contributors to innovation. Hidden Innovation peels back the veil, tracing the way innovation occurs through new forms of screen production enabled by social media platforms as well as in public broadcasting. It shows that creative workers are contributing fresh ideas across the economy and how creative cities debates need reframing. It traces how policies globally are beginning to catch up with the changing social and economic realities. In his new book, Cunningham argues that the innovation framework offers the best opportunity in decades to reassess and refresh the case for the public role of the humanities, particularly the media, cultural and communication studies disciplines.
Resumo:
This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.
Resumo:
Aim Our aim was to clarify the lineage-level relationships for Melomys cervinipes and its close relatives and investigate whether the patterns of divergence observed for these wet-forest-restricted mammals may be associated with recognized biogeographical barriers. Location Mesic closed forest along the east coast of Australia, from north Queensland to mid-eastern New South Wales. Methods To enable rigorous phylogenetic reconstruction, divergence-date estimation and phylogeographical inference, we analysed DNA sequence and microsatellite data from 307 specimens across the complete distribution of M. cervinipes (45 localities). Results Three divergent genetic lineages were found within M. cervinipes, corresponding to geographically delineated northern, central and southern clades. Additionally, a fourth lineage, comprising M. rubicola and M. capensis, was identified and was most closely related to the northern M. cervinipes lineage. Secondary contact of the northern and central lineages was identified at one locality to the north of the Burdekin Gap. Main conclusions Contemporary processes of repeated habitat fragmentation and contraction, local extinction events and subsequent re-expansion across both small and large areas, coupled with the historical influence of the Brisbane Valley Barrier, the St Lawrence Gap and the Burdekin Gap, have contributed to the present phylogeographical structure within M. cervinipes. Our study highlights the need to sample close to the periphery of putative biogeographical barriers or risk missing vital phylogeographical information that may significantly alter the interpretation of biogeographical hypotheses.
Resumo:
Since the severe acute respiratory syndrome outbreak in 2003, it has been argued that there has been a substantial revision to the norm dictating the behaviour of states in the event of a disease outbreak. This article examines the evolution of the norm to ‘report and verify’ disease outbreaks and evaluates the extent to which this revised norm has begun to guide state behaviour. Examination of select East Asian countries affected by human infections of the H5N1 (avian influenza) virus strain reveals the need to further understand the mutually constitutive relationship between the value attached to prompt reporting against the capacity to report, and how states manage both in fulfilling their duty to report.
Resumo:
"The Responsibility to Protect (R2P) is a major new international principle, adopted unanimously in 2005 by Heads of State and Government. Whilst it is broadly acknowledged that the principle has an important and intimate relationship with international law, especially the law relating to sovereignty, peace and security, human rights and armed conflict, there has yet to be a volume dedicated to this question. The Responsibility to Protect and International Law fills that gap by bringing together leading scholars from North America, Europe and Australia to examine R2P’s legal content. The Responsibility to Protect and International Law focuses on questions relating to R2P’s legal quality, its relationship with sovereignty, and the question of whether the norm establishes legal obligations. It also aims to introduce readers to different legal perspectives, including feminism, and pressing practical questions such as how the law might be used to prevent genocide and mass atrocities, and punish the perpetrators."--publisher website
Resumo:
Thunderstorm downbursts are important for wind engineers as they have been shown to produce the design wind speeds for mid to high return periods in many regions of Australia [1]. In structural design codes (e.g. AS/NZS1170.02-02) an atmospheric boundary layer (ABL) is assumed, and a vertical profile is interpolated from recorded 10 m wind speeds. The ABL assumption is however inaccurate when considering the complex structure of a thunderstorm outflow, and its effects on engineered structures. Several researchers have shown that the downburst, close to its point of divergence is better represented by an impinging wall jet profile than the traditional ABL. Physical modelling is the generally accepted approach to estimate wind loads on structures and it is therefore important to physically model the thunderstorm downburst so that its effects on engineered structures may be studied. An advancement on the simple impinging jet theory, addressed here is the addition of a pulsing mechanism to the jet which allows not only the divergent characteristics of a downburst to be produced, but also it allows the associated leading ring vortex to be developed. The ring vortex modelling is considered very important for structural design as it is within the horizontal vortex that the largest velocities occur [2]. This paper discusses the flow field produced by a pulsed wall jet, and also discusses the induced pressures that this type of flow has on a scaled tall building.
Resumo:
Impinging flow occurs when a fluid impacts a comparatively solid boundary upon which divergence occurs. A perfect example of an impinging flow is the impact and divergence of air at ground level during a thunderstorm outflow. The importance of modelling thunderstorm outflows, and in particular the downburst is now well-known to the wind engineering community and research into many of its characteristics is underway throughout the world. The reader is directed to the text by Fujita [I] for an introduction to downburst concepts and theory.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
Background Animal and human infection with multiple parasite species is the norm rather than the exception, and empirical studies and animal models have provided evidence for a diverse range of interactions among parasites. We demonstrate how an optimal control strategy should be tailored to the pathogen community and tempered by species-level knowledge of drug sensitivity with use of a simple epidemiological model of gastro-intestinal nematodes. Methods We construct a fully mechanistic model of macroparasite co-infection and use it to explore a range of control scenarios involving chemotherapy as well as improvements to sanitation. Results Scenarios are presented whereby control not only releases a more resistant parasite from antagonistic interactions, but risks increasing co-infection rates, exacerbating the burden of disease. In contrast, synergisms between species result in their becoming epidemiologically slaved within hosts, presenting a novel opportunity for controlling drug resistant parasites by targeting co-circulating species. Conclusions Understanding the effects on control of multi-parasite species interactions, and vice versa, is of increasing urgency in the advent of integrated mass intervention programmes.
Resumo:
Age-related Macular Degeneration (AMD) is one of the major causes of vision loss and blindness in ageing population. Currently, there is no cure for AMD, however early detection and subsequent treatment may prevent the severe vision loss or slow the progression of the disease. AMD can be classified into two types: dry and wet AMDs. The people with macular degeneration are mostly affected by dry AMD. Early symptoms of AMD are formation of drusen and yellow pigmentation. These lesions are identified by manual inspection of fundus images by the ophthalmologists. It is a time consuming, tiresome process, and hence an automated diagnosis of AMD screening tool can aid clinicians in their diagnosis significantly. This study proposes an automated dry AMD detection system using various entropies (Shannon, Kapur, Renyi and Yager), Higher Order Spectra (HOS) bispectra features, Fractional Dimension (FD), and Gabor wavelet features extracted from greyscale fundus images. The features are ranked using t-test, Kullback–Lieber Divergence (KLD), Chernoff Bound and Bhattacharyya Distance (CBBD), Receiver Operating Characteristics (ROC) curve-based and Wilcoxon ranking methods in order to select optimum features and classified into normal and AMD classes using Naive Bayes (NB), k-Nearest Neighbour (k-NN), Probabilistic Neural Network (PNN), Decision Tree (DT) and Support Vector Machine (SVM) classifiers. The performance of the proposed system is evaluated using private (Kasturba Medical Hospital, Manipal, India), Automated Retinal Image Analysis (ARIA) and STructured Analysis of the Retina (STARE) datasets. The proposed system yielded the highest average classification accuracies of 90.19%, 95.07% and 95% with 42, 54 and 38 optimal ranked features using SVM classifier for private, ARIA and STARE datasets respectively. This automated AMD detection system can be used for mass fundus image screening and aid clinicians by making better use of their expertise on selected images that require further examination.
Resumo:
We examined goal importance, focusing on high, but not exclusive priority goals, in the theory of planned behaviour (TPB) to predict students’ academic performance. At the beginning of semester, students in a psychology subject (N = 197) completed TPB and goal importance items for achieving a high grade. Regression analyses revealed partial support for the TPB. Perceived behavioural control, but not attitude or subjective norm, significantly predicted intention, with intention predicting final grade. Goal importance significantly predicted intention, but not final grade, indicating that perceiving a performance goal as highly, but not necessarily exclusively, important impacts on students’ achievement intentions.
Resumo:
Age-related macular degeneration (AMD) affects the central vision and subsequently may lead to visual loss in people over 60 years of age. There is no permanent cure for AMD, but early detection and successive treatment may improve the visual acuity. AMD is mainly classified into dry and wet type; however, dry AMD is more common in aging population. AMD is characterized by drusen, yellow pigmentation, and neovascularization. These lesions are examined through visual inspection of retinal fundus images by ophthalmologists. It is laborious, time-consuming, and resource-intensive. Hence, in this study, we have proposed an automated AMD detection system using discrete wavelet transform (DWT) and feature ranking strategies. The first four-order statistical moments (mean, variance, skewness, and kurtosis), energy, entropy, and Gini index-based features are extracted from DWT coefficients. We have used five (t test, Kullback–Lieber Divergence (KLD), Chernoff Bound and Bhattacharyya Distance, receiver operating characteristics curve-based, and Wilcoxon) feature ranking strategies to identify optimal feature set. A set of supervised classifiers namely support vector machine (SVM), decision tree, k -nearest neighbor ( k -NN), Naive Bayes, and probabilistic neural network were used to evaluate the highest performance measure using minimum number of features in classifying normal and dry AMD classes. The proposed framework obtained an average accuracy of 93.70 %, sensitivity of 91.11 %, and specificity of 96.30 % using KLD ranking and SVM classifier. We have also formulated an AMD Risk Index using selected features to classify the normal and dry AMD classes using one number. The proposed system can be used to assist the clinicians and also for mass AMD screening programs.
Resumo:
Heliothine moths (Lepidoptera: Heliothinae) include some of the world's most devastating pest species. Whereas the majority of nonpest heliothinae specialize on a single plant family, genus, or species, pest species are highly polyphagous, with populations often escalating in size as they move from one crop species to another. Here, we examine the current literature on heliothine host-selection behavior with the aim of providing a knowledge base for research scientists and pest managers. We review the host relations of pest heliothines, with a particular focus on Helicoverpa armigera (Hubner), the most economically damaging of all heliothine species. We then consider the important question of what constitutes a host plant in these moths, and some of the problems that arise when trying to determine host plant status from empirical studies on host use. The top six host plant families in the two main Australian pest species (H. armigera and Helicoverpa punctigera Wallengren) are the same and the top three (Asteraceae, Fabaceae, and Malvaceae) are ranked the same (in terms of the number of host species on which eggs or larvae have been identified), suggesting that these species may use similar cues to identify their hosts. In contrast, for the two key pest heliothines in the Americas, the Fabaceae contains approximate to 1/3 of hosts for both. For Helicoverpa zea (Boddie), the remaining hosts are more evenly distributed, with Solanaceae next, followed by Poaceae, Asteraceae, Malvaceae, and Rosaceae. For Heliothis virescens (F.), the next highest five families are Malvaceae, Asteraceae, Solanaceae, Convolvulaceae, and Scrophulariaceae. Again there is considerable overlap in host use at generic and even species level. H. armigera is the most widely distributed and recorded from 68 plant families worldwide, but only 14 families are recorded as a containing a host in all geographic areas. A few crop hosts are used throughout the range as expected, but in some cases there are anomalies, perhaps because host plant relation studies are not comparable. Studies on the attraction of heliothines to plant odors are examined in the context of our current understanding of insect olfaction, with the aim of better understanding the connection between odor perception and host choice. Finally, we discuss research into sustainable management of pest heliothines using knowledge of heliothine behavior and ecology. A coordinated international research effort is needed to advance our knowledge on host relations in widely distributed polyphagous species instead of the localized, piecemeal approaches to understanding these insects that has been the norm to date.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
This study reports the construction and reconstruction of identities of new and existing employees during a significant transition phase of a nuclear engineering organization. We followed a group of new and existing employees over the period of three years, during which the organization constructed a greenfield nuclear facility with new generational technologies whilst in parallel, decommissioned the older reactor. This change led to the transfer and integration of existing trade-based employees with the newly recruited, primarily university educated graduates in the new site. Three waves of interview data were collected, in conjunction with the cognitive mapping of social grouping and photo elicitation portrayed the stories of different group of employees who either succeeded or failed at embracing their new professional identity. In contrast with the new recruits who constructed new identities as they join this organization, we identify and report on the number of enabling and disabling factors that influence the process of professional identity construction and reconstruction during gamma change.