475 resultados para requirements for use
Resumo:
While purporting to enhance Australia’s sustainability, the federal government’s Population Strategy rejects the assessment of the limiting factors to future population growth, thus avoiding urgent threshold issues such as resource depletion and environmental destruction. A more forward-thinking and whole-system perspective would assess and incorporate critical biophysical limits into governance processes with suitable prioritisation. It would encourage communities to examine their individual and collective responsibilities in the context of these limits in order to most equitably optimise outcomes; and it would employ both a resource-based examination of minimum population requirements, and an impact-based assessment of maximum thresholds. This carrying capacity approach to planning could help guide society towards a more sustainable future.
Resumo:
Transmission smart grids will use a digital platform for the automation of high voltage substations. The IEC 61850 series of standards, released in parts over the last ten years, provide a specification for substation communications networks and systems. These standards, along with IEEE Std 1588-2008 Precision Time Protocol version 2 (PTPv2) for precision timing, are recommended by the both IEC Smart Grid Strategy Group and the NIST Framework and Roadmap for Smart Grid Interoperability Standards for substation automation. IEC 61850, PTPv2 and Ethernet are three complementary protocol families that together define the future of sampled value digital process connections for smart substation automation. A time synchronisation system is required for a sampled value process bus, however the details are not defined in IEC 61850-9-2. PTPv2 provides the greatest accuracy of network based time transfer systems, with timing errors of less than 100 ns achievable. The suitability of PTPv2 to synchronise sampling in a digital process bus is evaluated, with preliminary results indicating that steady state performance of low cost clocks is an acceptable ±300 ns, but that corrections issued by grandmaster clocks can introduce significant transients. Extremely stable grandmaster oscillators are required to ensure any corrections are sufficiently small that time synchronising performance is not degraded.
Resumo:
Small animal fracture models have gained increasing interest in fracture healing studies. To achieve standardized and defined study conditions, various variables must be carefully controlled when designing fracture healing experiments in mice or rats. The strain, age and sex of the animals may influence the process of fracture healing. Furthermore, the choice of the fracture fixation technique depends on the questions addressed, whereby intra- and extramedullary implants as well as open and closed surgical approaches may be considered. During the last few years, a variety of different, highly sophisticated implants for fracture fixation in small animals have been developed. Rigid fixation with locking plates or external fixators results in predominantly intramembranous healing in both mice and rats. Locking plates, external fixators, intramedullary screws, the locking nail and the pin-clip device allow different degrees of stability resulting in various amounts of endochondral and intramembranous healing. The use of common pins that do not provide rotational and axial stability during fracture stabilization should be discouraged in the future. Analyses should include at least biomechanical and histological evaluations, even if the focus of the study is directed towards the elucidation of molecular mechanisms of fracture healing using the largely available spectrum of antibodies and gene-targeted animals to study molecular mechanisms of fracture healing. This review discusses distinct requirements for the experimental setups as well as the advantages and pitfalls of the different fixation techniques in rats and mice.
Resumo:
Community-based treatment and care of people with psychiatric disabilities has meant that they are now more likely to engage in the parenting role. This has led to the development of programs designed to enhance the parenting skills of people with psychiatric disabilities. Evaluation of these programs has been hampered by a paucity of evaluation tools. This study's aim was to develop and trial a tool that examined the parent-child interaction within a group setting, was functional and easy to use, required minimum training and equipment, and had acceptable levels of reliability and validity. The revised tool yielded a single scale with acceptable reliability. It had discriminative validity and concurrent validity with non-independent global ratings of parenting. Sensitivity to change was not investigated. The findings suggest that this method of evaluating parenting is likely to have both clinical and research utility and further investigation of the psychometric properties of the tool is warranted.
Resumo:
Aims: The primary objective was to describe the usage pattern of hormone therapy (HT) in a sample of urban Australian women in 2001 and to assess the characteristics of users vs. non-users. The second objective was to determine whether there had been any change in usage since the publication of the results of the combined oestrogen plus progestagen arm of the Women's Health Initiative (WHI) in 2002. Methods: A cohort of 374 postmenopausal women aged 50–80 years participated in this substudy of the LAW (Longitudinal Assessment of Ageing in Women) project: a 5-year multidisciplinary, observational study. Participants completed an annual medical assessment including details of the use of HT and the reasons for use, as well as demographic and psychosocial data. Results: In December 2001, 30.8% of the participants were using HT, whereas 55.4% were ever users. The management of vasomotor symptoms and mood disturbance were the primary reasons for use. Of those who had been using HT in December 2001 (24.4%) women ceased using HT in the 3 months following publication of the WHI results. The percentage of women using HT in December 2003 (13.9%) was less than half of that of December 2001. Conclusion: The rate of HT use and the reasons for use, in 2001 in Brisbane was similar to that of other Australian regions. Usage of HT decreased since the publication of the WHI results in 2002 which may reflect changing attitudes by patients and practitioners regarding HT.
Resumo:
Psychoanalysis and related psychodynamic psychotherapies have historically had a limited engagement with substance use and antisocial personality disorders. This in part reflects an early preoccupation with ‘transference neuroses’ and in part reflects later de-emphasis of diagnosis and focus on therapeutic process. Nonetheless, psychoanalytic perspectives can usefully inform thinking about approaches to treatment of such disorders and there are psychoanalytic constructs that have specific relevance to their treatment. This paper reviews some prominent strands of psychoanalytic thinking as they pertain to the treatment of substance abuse and antisocial personality disorders. It is argued that, while Freudian formulations lead to a primarily pessimistic view of the prospect of treatment of such disorders, both the British object relations and the North American self psychology traditions suggest potentially productive approaches. Finally the limited empirical evidence from brief psychodynamically informed treatments of substance use disorders is reviewed. It is concluded that such treatments are not demonstrably effective but that, since no form of psychotherapy has established high efficacy with substance use disorders, brief psychdynamic therapies are not necessarily of lesser value than other treatments and may have specific value for particular individuals and in particular treatment contexts.
Resumo:
As the use of Twitter has become more commonplace throughout many nations, its role in political discussion has also increased. This has been evident in contexts ranging from general political discussion through local, state, and national elections (such as in the 2010 Australian elections) to protests and other activist mobilisation (for example in the current uprisings in Tunisia, Egypt, and Yemen, as well as in the controversy around Wikileaks). Research into the use of Twitter in such political contexts has also developed rapidly, aided by substantial advancements in quantitative and qualitative methodologies for capturing, processing, analysing, and visualising Twitter updates by large groups of users. Recent work has especially highlighted the role of the Twitter hashtag – a short keyword, prefixed with the hash symbol ‘#’ – as a means of coordinating a distributed discussion between more or less large groups of users, who do not need to be connected through existing ‘follower’ networks. Twitter hashtags – such as ‘#ausvotes’ for the 2010 Australian elections, ‘#londonriots’ for the coordination of information and political debates around the recent unrest in London, or ‘#wikileaks’ for the controversy around Wikileaks thus aid the formation of ad hoc publics around specific themes and topics. They emerge from within the Twitter community – sometimes as a result of pre-planning or quickly reached consensus, sometimes through protracted debate about what the appropriate hashtag for an event or topic should be (which may also lead to the formation of competing publics using different hashtags). Drawing on innovative methodologies for the study of Twitter content, this paper examines the use of hashtags in political debate in the context of a number of major case studies.
Resumo:
The increase of powerful mobile devices has accelerated the demand for mobile videos. Previous studies in mobile video have focused on understanding of mobile video usage, improvement of video quality, and user interface design in video browsing. However, research focusing on a deep understanding of users’ needs for a pleasing quality delivery of mobile video is lacking. In particular, what quality-delivery mode users prefer and what information relevant to video quality they need requires attention. This paper presents a qualitative interview study with 38 participants to gain an insight into three aspects: influencing factors of user-desired video quality, user-preferred quality-delivery modes, and user-required interaction information of mobile video. The results show that user requirements for video quality are related to personal preference, technology background and video viewing experience, and the preferred quality-delivery mode and interactive mode are diverse. These complex user requirements call for flexible and personalised quality delivery and interaction of mobile video.
Resumo:
International law’s capacity to influence state behaviour by regulating recourse to violence has been a longstanding source of debate among international lawyers and political scientists. On the one hand, sceptics assert that frequent violations of the prohibition on the use of force have rendered article 2(4) of the UN Charter redundant. They contend that national self-interest, rather than international law, is the key determinant of state behaviour regarding the use of force. On the other hand, defenders of article 2(4) argue first, that most states comply with the Charter framework, and second, that state rhetoric continues to acknowledge the existence of the jus ad bellum. In particular, the fact that violators go to considerable lengths to offer legal or factual justifications for their conduct – typically by relying on the right of self-defence – is advanced as evidence that the prohibition on the use of force retains legitimacy in the eyes of states. This paper identifies two potentially significant features of state practice since 2006 which may signal a shift in states’ perceptions of the normative authority of article 2(4). The first aspect is the recent failure by several states to offer explicit legal justifications for their use or force, or to report action taken in self-defence to the Security Council in accordance with Article 51. Four incidents linked to the global “war on terror” are examined here: Israeli airstrikes in Syria in 2007 and in Sudan in 2009, Turkey’s 2006-2008 incursions into northern Iraq, and Ethiopia’s 2006 intervention in Somalia. The second, more troubling feature is the international community’s apparent lack of concern over the legality of these incidents. Each use of force is difficult to reconcile with the strict requirements of the jus ad bellum; yet none attracted genuine legal scrutiny or debate among other states. While it is too early to conclude that these relatively minor incidents presage long term shifts in state practice, viewed together the two developments identified here suggest a possible downgrading of the role of international law in discussions over the use of force, at least in conflicts linked to the “war on terror”. This, in turn, may represent a declining perception of the normative authority of the jus ad bellum, and a concomitant admission of the limits of international law in regulating violence.
Resumo:
This paper presents a guidance approach for aircraft in periodic inspection tasks. The periodic inspection task involves flying to a series of desired fixed points of inspection with specified attitude requirements so that requirements for downward looking sensors, such as cameras, are achieved. We present a solution using a precision guidance law and a bank turn dynamics model. High fidelity simulation studies illustrate the effectiveness of this approach under both ideal (nil-wind) and non-ideal (wind) conditions.
Resumo:
It is recognised that individuals do not always respond honestly when completing psychological tests. One of the foremost issues for research in this area is the inability to detect individuals attempting to fake. While a number of strategies have been identified in faking, a commonality of these strategies is the latent role of long term memory. Seven studies were conducted in order to examine whether it is possible to detect the activation of faking related cognitions using a lexical decision task. Study 1 found that engagement with experiential processing styles predicted the ability to fake successfully, confirming the role of associative processing styles in faking. After identifying appropriate stimuli for the lexical decision task (Studies 2A and 2B), Studies 3 to 5 examined whether a cognitive state of faking could be primed and subsequently identified, using a lexical decision task. Throughout the course of these studies, the experimental methodology was increasingly refined in an attempt to successfully identify the relevant priming mechanisms. The results were consistent and robust throughout the three priming studies: faking good on a personality test primed positive faking related words in the lexical decision tasks. Faking bad, however, did not result in reliable priming of negative faking related cognitions. To more completely address potential issues with the stimuli and the possible role of affective priming, two additional studies were conducted. Studies 6A and 6B revealed that negative faking related words were more arousing than positive faking related words, and that positive faking related words were more abstract than negative faking related words and neutral words. Study 7 examined whether the priming effects evident in the lexical decision tasks occurred as a result of an unintentional mood induction while faking the psychological tests. Results were equivocal in this regard. This program of research aligned the fields of psychological assessment and cognition to inform the preliminary development and validation of a new tool to detect faking. Consequently, an implicit technique to identify attempts to fake good on a psychological test has been identified, using long established and robust cognitive theories in a novel and innovative way. This approach represents a new paradigm for the detection of individuals responding strategically to psychological testing. With continuing development and validation, this technique may have immense utility in the field of psychological assessment.
Resumo:
Web service technology is increasingly being used to build various e-Applications, in domains such as e-Business and e-Science. Characteristic benefits of web service technology are its inter-operability, decoupling and just-in-time integration. Using web service technology, an e-Application can be implemented by web service composition — by composing existing individual web services in accordance with the business process of the application. This means the application is provided to customers in the form of a value-added composite web service. An important and challenging issue of web service composition, is how to meet Quality-of-Service (QoS) requirements. This includes customer focused elements such as response time, price, throughput and reliability as well as how to best provide QoS results for the composites. This in turn best fulfils customers’ expectations and achieves their satisfaction. Fulfilling these QoS requirements or addressing the QoS-aware web service composition problem is the focus of this project. From a computational point of view, QoS-aware web service composition can be transformed into diverse optimisation problems. These problems are characterised as complex, large-scale, highly constrained and multi-objective problems. We therefore use genetic algorithms (GAs) to address QoS-based service composition problems. More precisely, this study addresses three important subproblems of QoS-aware web service composition; QoS-based web service selection for a composite web service accommodating constraints on inter-service dependence and conflict, QoS-based resource allocation and scheduling for multiple composite services on hybrid clouds, and performance-driven composite service partitioning for decentralised execution. Based on operations research theory, we model the three problems as a constrained optimisation problem, a resource allocation and scheduling problem, and a graph partitioning problem, respectively. Then, we present novel GAs to address these problems. We also conduct experiments to evaluate the performance of the new GAs. Finally, verification experiments are performed to show the correctness of the GAs. The major outcomes from the first problem are three novel GAs: a penaltybased GA, a min-conflict hill-climbing repairing GA, and a hybrid GA. These GAs adopt different constraint handling strategies to handle constraints on interservice dependence and conflict. This is an important factor that has been largely ignored by existing algorithms that might lead to the generation of infeasible composite services. Experimental results demonstrate the effectiveness of our GAs for handling the QoS-based web service selection problem with constraints on inter-service dependence and conflict, as well as their better scalability than the existing integer programming-based method for large scale web service selection problems. The major outcomes from the second problem has resulted in two GAs; a random-key GA and a cooperative coevolutionary GA (CCGA). Experiments demonstrate the good scalability of the two algorithms. In particular, the CCGA scales well as the number of composite services involved in a problem increases, while no other algorithms demonstrate this ability. The findings from the third problem result in a novel GA for composite service partitioning for decentralised execution. Compared with existing heuristic algorithms, the new GA is more suitable for a large-scale composite web service program partitioning problems. In addition, the GA outperforms existing heuristic algorithms, generating a better deployment topology for a composite web service for decentralised execution. These effective and scalable GAs can be integrated into QoS-based management tools to facilitate the delivery of feasible, reliable and high quality composite web services.
Resumo:
This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in the design of various system components. Using the model, we also define a few fundamental design and evaluation parameters. To demonstrate the significance of the proposed model, we provide an example of how it can be applied to formally define common attacks.
Resumo:
The objective of this thesis is to investigate whether the corporate governance practices adopted by Chinese listed firms are associated with the quality of earnings information. Based on a review of agency and institutional theory, this study develops hypotheses that predict the monitoring effectiveness of the board and the audit committee. Using a combination of univariate and multivariate analyses, the association between corporate governance mechanisms and earnings management are tested from 2004 to 2008. Through analysing the empirical results, a number of findings are summarised as below. First, board independence is weakened by the introduction of government officials as independent directors on the boards. Government officials acting as independent directors, claim that they meet the definition of independent director set by the regulation. However, they have some connection with the State, which is the controlling shareholder in listed SOEs affiliated companies. Consequently, the effect of the independent director’s expertise in constraining earnings management is mitigated as demonstrated by an insignificant association between board expertise and earnings management. An alternative explanation for the inefficiency of board independence may point to the pre-selection of independent directors by the powerful CEO. It is argued that a CEO can manipulate the board composition and choose the "desirable" independent directors to monitor themselves. Second, a number of internal mechanisms, such as board size, board activities, and the separation of the roles of the CEO and chair are found to be significantly associated with discretionary accruals. This result suggests that there are advantages in having a large and active board in the Chinese setting. This can offset the disadvantages associated with large boards, such as increased bureaucracy, and hence, increase the constraining effects of a large and resourceful board. Third, factor analysis identifies two factors: CEO power and board power. CEO power is the factor which consists of CEO duality and turnover, and board power is composed of board size and board activity. The results of CEO power show that if a Chinese listed company has CEO duality and turnover at the same time, it is more likely to have a high level of earnings management. The significant and negative relationship between board power and accruals indicate that large boards with frequent meetings can be associated with low level of earnings management. Overall, the factor analysis suggests that certain governance mechanisms complement each other to become more efficient monitors of opportunistic earnings management. A combination of board characteristics can increase the negative association with earnings management. Fourth, the insignificant results between audit committees and earnings management in Chinese listed firms suggests that the Chinese regulator should strengthen the audit committee functions. This thesis calls for listed firms to disclose more information on audit committee composition and activities, which can facilitate future research on the Chinese audit committee’s monitoring role. Fifth, the interactive results between State ownership and board characteristics show that dominant State ownership has a moderating effect on board monitoring power as the State totally controls 42% of the issued shares. The high percentage of State ownership makes it difficult for the non-controlling institutional shareholders to challenge the State’s dominant status. As a result, the association between non-controlling institutional ownership and earnings management is insignificant in most situations. Lastly, firms audited by the international Big4 have lower abnormal accruals than firms audited by domestic Chinese audit firms. In addition, the inverse U-shape relationship between audit tenure and earnings quality demonstrates the changing effects of audit quality after a certain period of appointment. Furthermore, this thesis finds that listing in Hong Kong Stock Exchanges can be an alternative governance mechanism to discipline Chinese firms to follow strict Hong Kong listing requirements. Management of Hong Kong listed companies are exposed to the scrutiny of international investors and Hong Kong regulators. This in turn reduces their chances of conducting self-interested earnings manipulation. This study is designed to fill the gap in governance literature in China that is related to earnings management. Previous research on corporate governance mechanisms and earnings management in China is not conclusive. The current research builds on previous literature and provides some meaningful implications for practitioners, regulators, academic, and international investors who have investment interests in a transitional country. The findings of this study contribute to corporate governance and earnings management literature in the context of the transitional economy of China. The use of alternative measures for earnings management yields similar results compared with the accruals models and produces additional findings.
Resumo:
Infant feeding is a complex behavior enacted in a risk adverse society. Despite ongoing communication and education strategies, breastfeeding rates in countries like Australia, the US, and the UK remain static, thus increasing the risk of short and long-term health problems. Health professionals and non-profit organizations recognize social marketing as an appropriate strategy for increasing breastfeeding duration since it addresses the shortfalls of education-only campaigns. Technology as an innovative alternative to mass media and education has the potential to reduce the social price of breastfeeding by assisting women to manage the identity and health risks associated with infant feeding. This paper reports findings from six focus groups that explored the risks associated with breastfeeding and the potential role of technology in ameliorating these risks. A key finding of this research was that technology has the potential to negate the impact of perceived uncertainty and lack of control associated with breastfeeding. The results indicated that future breastfeeding campaigns that are innovative in their approach and use technology may be more effective in changing breastfeeding behavior.