34 resultados para Old State House (Boston, Mass.)
Resumo:
Theories of entrepreneurship have largely been informed by research in western contexts, and recent calls for research attention to entrepreneurship in developing countries highlight the need for accurate information about entrepreneurship in this field. In addition, some findings from such research have highlighted the critical research needs in this area (Bruton, Ahlstrom & Obloj, 2009). This paper reports early findings from one study of a longitudinal research program with entrepreneurs in an Eastern African context, in a society largely affected by colonization and a long-standing civil war. Entrepreneurs in this study are recipients of micro-credit loans as well as elementary business training. Findings from a review of microloans indicate that entrepreneurial activities are largely in the form of local entrepreneurship rather than systemic entrepreneurship (Suatet, 2011) and the benefits of business improvements achieved from micro-loans are enhanced by feelings of agency and purpose regarding future business activities. Implications for theory and practice are presented.
Resumo:
A substantial body of literature exists identifying factors contributing to under-performing Enterprise Resource Planning systems (ERPs), including poor communication, lack of executive support and user dissatisfaction (Calisir et al., 2009). Of particular interest is Momoh et al.’s (2010) recent review identifying poor data quality (DQ) as one of nine critical factors associated with ERP failure. DQ is central to ERP operating processes, ERP facilitated decision-making and inter-organizational cooperation (Batini et al., 2009). Crucial in ERP contexts is that the integrated, automated, process driven nature of ERP data flows can amplify DQ issues, compounding minor errors as they flow through the system (Haug et al., 2009; Xu et al., 2002). However, the growing appreciation of the importance of DQ in determining ERP success lacks research addressing the relationship between stakeholders’ requirements and perceptions of ERP DQ, perceived data utility and the impact of users’ treatment of data on ERP outcomes.
Resumo:
Successful organizational transformation typically requires transformed leadership; that is, fundamental changes in the implicit leadership schema that underpin observed organizational leadership practice. The purpose of this study is to elaborate leadership schema change theory by investigating a case study in which the CEO of a public infrastructure organization sought to transform traditional organizational leadership to facilitate wider organization transformation. Data were generated through focus groups and semi-structured interviews at four points over a three-year period. Our findings suggest that (a) change leader initiatives do not necessarily activate the cognitive processing required to achieve leadership schema change, (b) collective schema change, defined in terms of the system of beliefs and values underlying the new leading-managing schema did not occur, however, (c) sub-schema change did occur. The research contributes to existing literature on implicit leadership schema change in three main ways. First, we provide a schema change framework to guide current and future research on schema change. Second, we highlight the role that both change leader initiatives and individual and social processing play in schema change. Finally, we stress the role of teleological processes in leadership schema change.
Resumo:
Ghassan Hage asserts the “core element of Australia’s colonial paranoia is a fear of loss of Europeanness or Whiteness and the lifestyle and privileges that are seen to emanate directly from them. This is a combination of the fragility of White European colonial identity in general and the specificity of the Australian situation” (419). This ‘White paranoia’ can be traced through a range of popular cultural formations, including contemporary Australian children’s literature. The Children’s Book Council of Australia (CBCA) awards an annual prize for “outstanding books which have the prime intention of documenting factual material with consideration given to imaginative presentation, interpretation and variation of style” (“Awards”) published in the preceding year. Although not often included in critical debates, non-fictional texts overtly seek to shape young readers’ understandings of their national context and their own location as national subjects. Thus, the books named as winners and honours of this prize from 2001-2010 provide a snapshot of which facts and whose fictions are salient in shaping the Australian nation in the twenty-first century. Using Hage’s concept of Australian colonial paranoia, this paper considers the relationship between ‘factual material’ and ‘imaginative presentation’ in the ongoing revision and renewal of national myths in award-winning Australian non-fiction for children.
Resumo:
We advocate for the use of predictive techniques in interactive computer music systems. We suggest that the inclusion of prediction can assist in the design of proactive rather than reactive computational performance partners. We summarize the significant role prediction plays in human musical decisions, and the only modest use of prediction in interactive music systems to date. After describing how we are working toward employing predictive processes in our own metacreation software we reflect on future extensions to these approaches.
Resumo:
Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.
Resumo:
This volume stems from the 1st International Conference on Epithelial-Mesenchymal Transitions (EMT), which was convened by the editors on October 5–8, 2003 in the beautiful setting of Port Douglas, Queensland, Australia. EMT, the name given to the transformation of cells arranged in a coherent layer – epithelial cells – to more individualistic and potential motile cells – mesenchymal cells – was recognized decades ago by Prof. Elisabeth (Betty) Hay (Harvard Medical School, Boston, Mass., USA) as a primary mechanism in embryogenesis for remodelling tissues. More recently EMT has been seen as crucial to the spread and invasion of carcinoma, and more recently still, EMT-like changes have been detected in various pathologies marked by fi brosis. Despite the basic and clinical importance of EMT, this extremely rapidly growing fi eld had never previously had a conference devoted to it, and indeed the disciplines of developmental biology, cancer and pathology rarely interact although they have much to share. The chapters assembled for this volume encompass these three major themes of the meeting, development, pathology and cancer, and further highlight the commonality in terms of mechanisms and outcomes among them...
Ways to increase the length of single wall carbon nanotubes in a magnetically enhanced arc discharge
Resumo:
Ability to control the properties of single-wall nanotubes produced in the arc discharge is important for many practical applications. Our experiments suggest that the length and purity of single-wall nanotubes significantly increase when the magnetic field is applied to the arc discharge. A model of a single wall carbon nanotube interaction and growth in the thermal plasma was developed which considers several important effects such as anode ablation that supplies the carbon plasma in an anodic arc discharge technique, and the momentum, charge and energy transfer processes between nanotube and plasma. The numerical simulations based on Monte-Carlo technique were performed, which explain an increase of the nanotubes produced in the magnetic field - enhanced arc discharge.
Resumo:
Object detection is a fundamental task in many computer vision applications, therefore the importance of evaluating the quality of object detection is well acknowledged in this domain. This process gives insight into the capabilities of methods in handling environmental changes. In this paper, a new method for object detection is introduced that combines the Selective Search and EdgeBoxes. We tested these three methods under environmental variations. Our experiments demonstrate the outperformance of the combination method under illumination and view point variations.
Resumo:
The digital divide is the disparancy in access to information, in the ability to communicate, and in the capacity to make information and communication serve full participation in the information society. Indeed, the conversation about the digital divide has developed over the last decade from a focus on connectivity and access to information and communication technologies, to a conversation that encompasses the ability to use them and to the utility that usage provides (Wei et al., 2011). However, this conversation, while transitioning from technology to the skills of the people that use them and to the fruits of their use is limited in its ability to take into account the social role of information and communication technologies (ICTs). One successful attempt in conceptualizing the social impact of the differences in access to and utilization of digital communication technologies, was developed by van Dijk (2005) whose sequential model for analyzing the divide states that: 1. Categorical inequalities in society produce an unequal distribution of resources; 2. An unequal distribution of resources causes unequal access to digital technologies; 3. Unequal access to digital technologies also depends on the characteristics of these technologies; 4. Unequal access to digital technologies brings about unequal participation in society; 5. Unequal participation in society reinforces categorical inequalities and unequal distributions of resources.” (p. 15) As van Dijk’s model demonstrates, the divide’s impact is the exclusion of individuals from participation. Still left to be defined are the “categorical inequalities,” the “resources,” the “characteristics of digital technologies,” and the different levels of “access” that result in differentiated levels of participation, as these change over time due to the evolving nature of technology and the dynamics of society. And most importantly, the meaning of “participation” in contemporary society needs to be determined as it is differentiated levels of participation that are the result of the divide and the engine of the ever-growing disparities. Our argument is structured in the following manner: We first claim that contemporary digital media differ from the previous generation of ICTs along four dimensions: They offer an abundance of information resources and communication channels when compared to the relative paucity of both in the past; they offer mobility as opposed to the stationary nature of their predecessors; they are interactive in that they provide users with the capability to design their own media environments in contrast to the dictated environs of previous architectures; and, they allow users to communicate utilizing multi forms of mediation, unlike the uniformity of sound or word that limited users in the past. We then submit that involvement in the information society calls for egalitarian access to all four dimensions of the user experience that make contemporary media different from their predecessors and that the ability to experience all four affects the levels in which humans partake in the shaping of society. The model being cyclical, we then discuss how lower levels of participation contribute to the enhancement of social inequalities. Finally, we discuss why participation is needed in order to achieve full membership in the information society and what political philosophy should govern policy solutions targeting the re-inclusion of those digitally excluded.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
The poster and three minute presentation shows how the QUT Stories digital collection is being built with special reference to an upcoming exhibition with QUT Old Government House http://digitalcollections.qut.edu.au/view/sub-collections/2057/Dr_Wilton_Wood_Russell_Love_Album.html The poster shows the lifecycle of the 1894 Photographic Album and its cultural heritage significance to QUT. How this album was digitised and the many ways we engaged with other staff throughout the University and the more widespread engagement with Alumni and the wider community is discussed. The poster and presentation was given at the CAUL Research Repositories Community Days 2015 held at the University of Melbourne, November 12-13 2015.
Resumo:
House dust is a heterogeneous matrix, which contains a number of biological materials and particulate matter gathered from several sources. It is the accumulation of a number of semi-volatile and non-volatile contaminants. The contaminants are trapped and preserved. Therefore, house dust can be viewed as an archive of both the indoor and outdoor air pollution. There is evidence to show that on average, people tend to stay indoors most of the time and this increases exposure to house dust. The aims of this investigation were to: " assess the levels of Polycyclic Aromatic Hydrocarbons (PAHs), elements and pesticides in the indoor environment of the Brisbane area; " identify and characterise the possible sources of elemental constituents (inorganic elements), PAHs and pesticides by means of Positive Matrix Factorisation (PMF); and " establish the correlations between the levels of indoor air pollutants (PAHs, elements and pesticides) with the external and internal characteristics or attributes of the buildings and indoor activities by means of multivariate data analysis techniques. The dust samples were collected during the period of 2005-2007 from homes located in different suburbs of Brisbane, Ipswich and Toowoomba, in South East Queensland, Australia. A vacuum cleaner fitted with a paper bag was used as a sampler for collecting the house dust. A survey questionnaire was filled by the house residents which contained information about the indoor and outdoor characteristics of their residences. House dust samples were analysed for three different pollutants: Pesticides, Elements and PAHs. The analyses were carried-out for samples of particle size less than 250 µm. The chemical analyses for both pesticides and PAHs were performed using a Gas Chromatography Mass Spectrometry (GC-MS), while elemental analysis was carried-out by using Inductively-Coupled Plasma-Mass Spectroscopy (ICP-MS). The data was subjected to multivariate data analysis techniques such as multi-criteria decision-making procedures, Preference Ranking Organisation Method for Enrichment Evaluations (PROMETHEE), coupled with Geometrical Analysis for Interactive Aid (GAIA) in order to rank the samples and to examine data display. This study showed that compared to the results from previous works, which were carried-out in Australia and overseas, the concentrations of pollutants in house dusts in Brisbane and the surrounding areas were relatively very high. The results of this work also showed significant correlations between some of the physical parameters (types of building material, floor level, distance from industrial areas and major road, and smoking) and the concentrations of pollutants. Types of building materials and the age of houses were found to be two of the primary factors that affect the concentrations of pesticides and elements in house dust. The concentrations of these two types of pollutant appear to be higher in old houses (timber houses) than in the brick ones. In contrast, the concentrations of PAHs were noticed to be higher in brick houses than in the timber ones. Other factors such as floor level, and distance from the main street and industrial area, also affected the concentrations of pollutants in the house dust samples. To apportion the sources and to understand mechanisms of pollutants, Positive Matrix Factorisation (PMF) receptor model was applied. The results showed that there were significant correlations between the degree of concentration of contaminants in house dust and the physical characteristics of houses, such as the age and the type of the house, the distance from the main road and industrial areas, and smoking. Sources of pollutants were identified. For PAHs, the sources were cooking activities, vehicle emissions, smoking, oil fumes, natural gas combustion and traces of diesel exhaust emissions; for pesticides the sources were application of pesticides for controlling termites in buildings and fences, treating indoor furniture and in gardens for controlling pests attacking horticultural and ornamental plants; for elements the sources were soil, cooking, smoking, paints, pesticides, combustion of motor fuels, residual fuel oil, motor vehicle emissions, wearing down of brake linings and industrial activities.