109 resultados para standard letters
Resumo:
This research explores the empirical association between takeover bid premium and acquired (purchased) goodwill, and tests whether the strength of the association changes after the passage of approved accounting standard AASB 1013 in Australia in 1988. AASB 1013 mandated capitalization and amortization of acquired goodwill to the income statement over a maximum period of 20 years. We use regressions to assess how the association between bid premium and acquired goodwill varies in the pre-AASB and post-AASB 1013 periods after controlling for confounding factors. Our results show that reducing the variety of accounting policy options available to bidder management after an acquisition results in a systematic reduction in the strength of the association between premium and goodwill.
Resumo:
Since the High Court decision of Cook v Cook (1986) 162 CLR 376, a person who voluntarily undertakes to instruct a learner driver of a motor vehicle is owed a lower standard of care than that owed to other road users. The standard of care was still expressed to be objective; however, it took into account the inexperience of the learner driver. Therefore, a person instructing a learner driver was owed a duty of care the standard being that of a reasonable learner driver. This ‘special relationship’ was said to exist because of the passenger’s knowledge of the driver’s inexperience and lack of skill. On 28 August 2008 the High Court handed down its decision in Imbree v McNeilly [2008] HCA 40, overruling Cook v Cook.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
This paper examines the role of powerful entities and coalitions in shaping international accounting standards. Specifically, the focus is on the process by which the International Accounting Standards Board (IASB) developed IFRS 6, Exploration for and Evaluation of Mineral Resources. In its Issues Paper, the IASB recommended that the successful efforts method be mandated for pre-production costs, eliminating the choice previously available between full cost and successful efforts methods. In spite of the endorsement of this view by a majority of the constituents who responded to the Issues Paper, the final outcome changed nothing, with choice being retained. A compelling explanation of this disparity between the visible inputs and outputs of the standard setting process is the existence of a “black box”, in which powerful extractive industries entities and coalitions covertly influenced the IASB to secure their own ends and ensure that the status quo was maintained
Resumo:
This paper explores the idea of virtual participation through the historical example of the republic of letters in early modern Europe (circa 1500-1800). By reflecting on the construction of virtuality in a historical context, and more specifically in a pre-digital environment, this paper calls attention to accusations of technological determinism in ongoing research concerning the affordances of the Internet and related media of communication. It argues that ‘the virtual’ is not synonymous with ‘the digital’ and suggests that, in order to articulate what is novel about modern technologies, we must first understand the social interactions underpinning the relationships which are facilitated through those technologies. By analysing the construction of virtuality in a pre-digital environment, this paper thus offers a baseline from which scholars might consider what is different about the modes of interaction and communication being engaged in via modern media.
Resumo:
In this chapter, a rationale is developed for incorporating philosophy into teacher training programs as a means of both preparing quality teachers for the 21st century and meeting the expectations detailed in the professional standards established by the statutory authority that regulates the profession in Queensland, the Queensland College of Teaching is presented. Furthermore, in-service teachers from Buranda State School, a Brisbane primary school that has been successfully teaching philosophy to its students for over 10 years, shares their experiences of teaching philosophy and how it has enhanced student learning and the quality of teaching and professionalism of the teachers. Finally, the implications of embedding philosophy into teacher training programs are explored in terms of developing the personal integrity of beginning teachers.
Resumo:
The design of driven pile foundations involves an iterative process requiring an initial estimate of the refusal level to determine the depth of boreholes for subsequent analyses. Current procedures for determining borehole depths incorporate parameters typically unknown at the investigation stage. Thus, a quantifiable procedure more applicable at this preliminary stage would provide greater confidence in estimating the founding level of driven piles. This paper examines the effectiveness of the Standard Penetration Test (SPT) in directly estimating driven pile refusal levels. A number of significant correlations were obtained between SPT information and pile penetration records demonstrating the potential application of the SPT. Results indicated pile penetration was generally best described as a function of both the pile toe and cumulative shaft SPT values. The influence of the toe SPT increased when piles penetrated rock. A refusal criteria was established from the results to guide both the estimation of borehole depths and likely pile lengths during the design stage.
Resumo:
Introduction: There are many low intensity (LI) cognitive behavoural therapy (CBT) solutions to the problem of limited service access. In this chapter, we aim to discuss a relatively low-technology approach to access using standard postal services-CBT by mail, or M-CBT. Bibliotherapies including M-CBT teach key concepts and self-management techniques, together with screening tools and forms to structure home practice. M-CBT differs from other bibliotherapies by segmenting interventions and mailing them at regular intervals. Most involve participants returning copies of monitoring forms or completed handouts. Therapist feedback is provided, often in personal letters that accompany the printed materials. Participants may also be given access to telephone or email support. ----- ----- M-CBT clearly fulfills criteria for an LI CBT (see Bennett-Levy et al., Chapter 1, for a definition of LI interventions). Once written, they involve little therapist time and rely heavily on self-management. However, content and overall treatment duration need not be compromised. Long-term interventions with multiple components can be delivered via this method, provided their content can be communicated in letters and engagement is maintained.
Resumo:
In Cook v Cook the Australian High Court held that the standard of reasonable care owed by a learner driver to an instructor, conscious of the driver’s lack of experience, was lower than that owed to other passengers and road users. Recently, in Imbree v McNeilly, the High Court declined to follow this principle, concluding that the driver’s status or relationship with the claimant should no longer influence or alter the standard of care owed. The decision therefore provides an opportunity to re-examine the rationale and policy behind current jurisprudence governing the standard of care owed by learner drivers. In doing so, this article considers the principles relevant to determining the standard and Imbree’s implications for other areas of tort law and claimant v defendant relationships. It argues that Imbree was influenced by changing judicial perceptions concerning the vulnerability of driving instructors and the relevance of insurance to tortious liability.
Resumo:
This chapter explores the idea of virtual participation through the historical example of the republic of letters in early modern Europe (circa 1500-1800). By reflecting on the construction of virtuality in a historical context, and more specifically in a pre-digital environment, it calls attention to accusations of technological determinism in ongoing research concerning the affordances of the Internet and related media of communication. It argues that ‘the virtual’ is not synonymous with ‘the digital’ and suggests that, in order to articulate what is novel about modern technologies, we must first understand the social interactions underpinning the relationships which are facilitated through those technologies. By analysing the construction of virtuality in a pre-digital environment, this chapter thus offers a baseline from which scholars might consider what is different about the modes of interaction and communication being engaged in via modern media.
Comparison of standard image segmentation methods for segmentation of brain tumors from 2D MR images
Resumo:
In the analysis of medical images for computer-aided diagnosis and therapy, segmentation is often required as a preliminary step. Medical image segmentation is a complex and challenging task due to the complex nature of the images. The brain has a particularly complicated structure and its precise segmentation is very important for detecting tumors, edema, and necrotic tissues in order to prescribe appropriate therapy. Magnetic Resonance Imaging is an important diagnostic imaging technique utilized for early detection of abnormal changes in tissues and organs. It possesses good contrast resolution for different tissues and is, thus, preferred over Computerized Tomography for brain study. Therefore, the majority of research in medical image segmentation concerns MR images. As the core juncture of this research a set of MR images have been segmented using standard image segmentation techniques to isolate a brain tumor from the other regions of the brain. Subsequently the resultant images from the different segmentation techniques were compared with each other and analyzed by professional radiologists to find the segmentation technique which is the most accurate. Experimental results show that the Otsu’s thresholding method is the most suitable image segmentation method to segment a brain tumor from a Magnetic Resonance Image.
Resumo:
This was the question that confronted Wilson J in Jarema Pty Ltd v Michihiko Kato [2004] QSC 451. Facts The plaintiff was the buyer of a commercial property at Bundall. The property comprised a 6 storey office building with a basement car park with 54 car parking spaces. The property was sold for $5 million with the contract being the standard REIQ/QLS form for Commercial Land and Buildings (2nd ed GST reprint). The contract provided for a “due diligence” period. During this period, the buyer’s solicitors discovered that there was no direct access from a public road to the car park entrance. Access to the car park was over a lot of which the Gold Coast City Council was the registered owner under a nomination of trustees, the Council holding the property on trust for car parking and town planning purposes. Due to the absence of a registered easement over the Council’s land, the buyer’s solicitors sought a reduction in the purchase price. The seller would not agree to this. Finally the sale was completed with the buyer reserving its rights to seek compensation.