484 resultados para Explicit guarantees
Resumo:
Due to the increasing speed of landscape changes and the massive development of computer technologies, the methods of representing heritage landscapes using digital tools have become a worldwide concern in conservation research. The aim of this paper is to demonstrate how an ‘interpretative model’ can be used for contextual design of heritage landscape information systems. This approach is explored through building a geographic information system database for St Helena Island national park in Moreton Bay, South East Queensland, Australia. Stakeholders' interpretations of this landscape were collected through interviews, and then used as a framework for designing the database. The designed database is a digital inventory providing contextual descriptions of the historic infrastructure remnants on St Helena Island. It also reveals the priorities of different sites in terms of historic research, landscape restoration, and tourism development. Additionally, this database produces thematic maps of the intangible heritage values, which could be used for landscape interpretation. This approach is different from the existing methods because building a heritage information system is deemed as an interpretative activity, rather than a value-free replication of the physical environment. This approach also shows how a cultural landscape methodology can be used to create a flexible information system for heritage conservation. The conclusion is that an ‘interpretative model’ of database design facilitates a more explicit focus on information support, and is a potentially effective approach to user-centred design of geographic information systems.
Resumo:
English is currently ascendant as the language of globalisation, evident in its mediation of interactions and transactions worldwide. For many international students, completion of a degree in English means significant credentialing and increased job prospects. Australian universities are the third largest English-speaking destination for overseas students behind the United States and the United Kingdom. International students comprise one-fifth of the total Australian university population, with 80% coming from Asian countries (ABS, 2010). In this competitive higher education market, English has been identified as a valued ‘good’. Indeed, universities have been critiqued for relentlessly reproducing the “hegemony and homogeneity of English” (Marginson, 2006, p. 37) in order to sustain their advantage in the education market. For international students, English is the gatekeeper to enrolment, the medium of instruction and the mediator of academic success. For these reasons, English is not benign, yet it remains largely taken-for-granted in the mainstream university context. This paper problematises the naturalness of English and reports on a study of an Australian Master of Education course in which English was a focus. The study investigated representations of English as they were articulated across a chain of texts including the university strategic plan, course assessment criteria, student assignments, lecturer feedback, and interviews. Critical Discourse Analysis (CDA) and Foucault’s work on discourse enabled understandings of how a particular English is formed through an apparatus of specifications, exclusionary thresholds, strategies for maintenance (and disruption), and privileged concepts and speaking positions. The findings indicate that English has hegemonic status within the Australian university, with material consequences for students whose proficiency falls outside the thresholds of accepted English practice. Central to the constitution of what counts as English is the relationship of equivalence between standard written English and successful academic writing. International students’ representations of English indicate a discourse that impacts on identities and practices and preoccupies them considerably as they negotiate language and task demands. For the lecturer, there is strategic manoeuvring within the institutional regulative regime to support students’ English language needs using adapted assessment practices, explicit teaching of academic genres and scaffolded classroom interaction. The paper concludes with the implications for university teaching and learning.
Resumo:
This study examined an aspect of adolescent writing development, specifically whether teaching secondary school students to use strategies to enhance succinctness in their essays changed the grammatical sophistication of their sentences. A quasi-experimental intervention was used to compare changes in syntactic complexity and lexical density between one-draft and polished essays. No link was demonstrated between the intervention and the changes. A thematic analysis of teacher interviews explored links between changes to student texts and teaching approaches. The study has implications for making syntactic complexity an explicit goal of student drafting.
Resumo:
Background It is often believed that by ensuring the ongoing completion of competency documents and life-long learning in nursing practice guarantees quality patient care. This is probably true in most cases where it provides reassurances that the nursing team is maintaining a safe “generalised” level of practice. However, competency does not always promise quality performance. There are a number of studies that have reported differences in what practitioners know and what they actually do despite being deemed competent. Aim The aim of this study was to assess whether our current competency documentation is fit for purpose and to ascertain whether performance assessment needs to be a key component in determining competence. Method 15 nurses within a General ICU who had been on the unit <4 years agreed to participate in this project. Using participant observation and assessing performance against key indicators of the Benner Novice to Expert5 model the participants were supported and assessed over the course of a ‘normal’ nursing shift. Results The results were surprising both positively and negatively. First, the nurses felt more empowered in their clinical decision making skills; second, it identified individual learning needs and milestones in educational development. There were some key challenges identified which included 5 nurses over estimating their level of competence, practice was still very much focused on task acquisition and skill and surprisingly some nurses still felt dominated by the other health professionals within the unit. Conclusion We found that the capacity and capabilities of our nursing workforce needs continual ongoing support especially if we want to move our staff from capable task-doer to competent performers. Using the key novice to expert indicators identified the way forward for us in how we assess performance and competence in practice particularly where promotion to higher grades is based on existing documentation.
Resumo:
In this paper we consider the third-moment structure of a class of time series models. It is often argued that the marginal distribution of financial time series such as returns is skewed. Therefore it is of importance to know what properties a model should possess if it is to accommodate unconditional skewness. We consider modeling the unconditional mean and variance using models that respond nonlinearly or asymmetrically to shocks. We investigate the implications of these models on the third-moment structure of the marginal distribution as well as conditions under which the unconditional distribution exhibits skewness and nonzero third-order autocovariance structure. In this respect, an asymmetric or nonlinear specification of the conditional mean is found to be of greater importance than the properties of the conditional variance. Several examples are discussed and, whenever possible, explicit analytical expressions provided for all third-order moments and cross-moments. Finally, we introduce a new tool, the shock impact curve, for investigating the impact of shocks on the conditional mean squared error of return series.
Resumo:
The effectiveness of any trapping system is highly dependent on the ability to accurately identify the specimens collected. For many fruit fly species, accurate identification (= diagnostics) using morphological or molecular techniques is relatively straightforward and poses few technical challenges. However, nearly all genera of pest tephritids also contain groups of species where single, stand-alone tools are not sufficient for accurate identification: such groups include the Bactrocera dorsalis complex, the Anastrepha fraterculus complex and the Ceratitis FAR complex. Misidentification of high-impact species from such groups can have dramatic consequences and negate the benefits of an otherwise effective trapping program. To help prevent such problems, this chapter defines what is meant by a species complex and describes in detail how the correct identification of species within a complex requires the use of an integrative taxonomic approach. Integrative taxonomy uses multiple, independent lines of evidence to delimit species boundaries, and the underpinnings of this approach from both the theoretical speciation literature and the systematics/taxonomy literature are described. The strength of the integrative approach lies in the explicit testing of hypotheses and the use of multiple, independent species delimitation tools. A case is made for a core set of species delimitation tools (pre- and post-zygotic compatibility tests, multi-locus phylogenetic analysis, chemoecological studies, and morphometric and geometric morphometric analyses) to be adopted as standards by tephritologists aiming to resolve economically important species complexes. In discussing the integrative approach, emphasis is placed on the subtle but important differences between integrative and iterative taxonomy. The chapter finishes with a case study that illustrates how iterative taxonomy applied to the B. dorsalis species complex led to incorrect taxonomic conclusions, which has had major implications for quarantine, trade, and horticultural pest management. In contrast, an integrative approach to the problem has resolved species limits in this taxonomically difficult group, meaning that robust diagnostics are now available.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
In this paper, the trajectory tracking control of an autonomous underwater vehicle (AUVs) in six-degrees-of-freedom (6-DOFs) is addressed. It is assumed that the system parameters are unknown and the vehicle is underactuated. An adaptive controller is proposed, based on Lyapunov׳s direct method and the back-stepping technique, which interestingly guarantees robustness against parameter uncertainties. The desired trajectory can be any sufficiently smooth bounded curve parameterized by time even if consist of straight line. In contrast with the majority of research in this field, the likelihood of actuators׳ saturation is considered and another adaptive controller is designed to overcome this problem, in which control signals are bounded using saturation functions. The nonlinear adaptive control scheme yields asymptotic convergence of the vehicle to the reference trajectory, in the presence of parametric uncertainties. The stability of the presented control laws is proved in the sense of Lyapunov theory and Barbalat׳s lemma. Efficiency of presented controller using saturation functions is verified through comparing numerical simulations of both controllers.
Resumo:
The growth of APIs and Web services on the Internet, especially through larger enterprise systems increasingly being leveraged for Cloud and software-as-a-service opportuni- ties, poses challenges to improving the efficiency of integration with these services. Interfaces of enterprise systems are typically larger, more complex and overloaded, with single operation having multiple data entities and parameter sets, supporting varying requests, and reflecting versioning across different system releases, compared to fine-grained operations of contemporary interfaces. We propose a technique to support the refactoring of service interfaces by deriving business entities and their relationships. In this paper, we focus on the behavioural aspects of service interfaces, aiming to discover the sequential dependencies of operations (otherwise known as protocol extraction) based on the entities and relationships derived. Specifically, we propose heuristics according to these relationships, and in turn, deriving permissible orders in which operations are invoked. As a result of this, service operations can be refactored on business entity CRUD lines, with explicit behavioural protocols as part of an interface definition. This supports flexible service discovery, composition and integration. A prototypical implementation and analysis of existing Web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms proposed through the paper.
Resumo:
The quality of species distribution models (SDMs) relies to a large degree on the quality of the input data, from bioclimatic indices to environmental and habitat descriptors (Austin, 2002). Recent reviews of SDM techniques, have sought to optimize predictive performance e.g. Elith et al., 2006. In general SDMs employ one of three approaches to variable selection. The simplest approach relies on the expert to select the variables, as in environmental niche models Nix, 1986 or a generalized linear model without variable selection (Miller and Franklin, 2002). A second approach explicitly incorporates variable selection into model fitting, which allows examination of particular combinations of variables. Examples include generalized linear or additive models with variable selection (Hastie et al. 2002); or classification trees with complexity or model based pruning (Breiman et al., 1984, Zeileis, 2008). A third approach uses model averaging, to summarize the overall contribution of a variable, without considering particular combinations. Examples include neural networks, boosted or bagged regression trees and Maximum Entropy as compared in Elith et al. 2006. Typically, users of SDMs will either consider a small number of variable sets, via the first approach, or else supply all of the candidate variables (often numbering more than a hundred) to the second or third approaches. Bayesian SDMs exist, with several methods for eliciting and encoding priors on model parameters (see review in Low Choy et al. 2010). However few methods have been published for informative variable selection; one example is Bayesian trees (O’Leary 2008). Here we report an elicitation protocol that helps makes explicit a priori expert judgements on the quality of candidate variables. This protocol can be flexibly applied to any of the three approaches to variable selection, described above, Bayesian or otherwise. We demonstrate how this information can be obtained then used to guide variable selection in classical or machine learning SDMs, or to define priors within Bayesian SDMs.
Resumo:
Crime analysts have traditionally received little guidance from academic researchers in key tasks in the analysis process, specifically the testing of multiple hypotheses and evaluating evidence in a scientific fashion. This article attempts to fill this gap by outlining a method (the Analysis of Competing Hypotheses) of systematically analysing multiple explanations for crime problems. The method is systematic, avoids many cognitive errors common in analysis, and is explicit. It is argued that the implementation of this approach makes analytic products audit-able, the reasoning underpinning them transparent, and provides intelligence managers a rational professional development tool for individual analysts.
Resumo:
Older populations are more likely to have multiple co-morbid diseases that require multiple treatments, which make them a large consumer of medications. As a person grows older, their ability to tolerate medications becomes less due to age-related changes in pharmacokinetics and pharmacodynamics often heading along a path that leads to frailty. Frail older persons often have multiple co-morbidities with signs of impairment in activities of daily living. Prescribing drugs for these vulnerable individuals is difficult and is a potentially unsafe activity. Inappropriate prescribing in older population can be detected using explicit (criterion-based) or implicit (judgment-based) criteria. Unfortunately, most current therapeutic guidelines are applicable only to healthy older adults and cannot be generalized to frail patients. These discrepancies should be addressed either by developing new criteria or by refining the existing tools for frail older people. The first and foremost step is to identify the frail patient in clinical practice by applying clinically validated tools. Once the frail patient has been identified, there is a need for specific measures or criteria to assess appropriateness of therapy that consider such factors as quality of life, functional status and remaining life expectancy and thus modified goals of care.
Resumo:
Out-of-plane behaviour of mortared and mortarless masonry walls with various forms of reinforcement, including unreinforced masonry as a base case is examined using a layered shell element based explicit finite element modelling method. Wall systems containing internal reinforcement, external surface reinforcement and intermittently laced reinforced concrete members and unreinforced masonry panels are considered. Masonry is modelled as a layer with macroscopic orthotropic properties; external reinforcing render, grout and reinforcing bars are modelled as distinct layers of the shell element. Predictions from the layered shell model have been validated using several out-of-plane experimental datasets reported in the literature. The model is used to examine the effectiveness of two retrofitting schemes for an unreinforced masonry wall.
Resumo:
With a strong emphasis on the interconnection between theory and practice, and how past/present intersections inform the future, these thirty-one articles by artist/scholars and artist/teachers profile current dance research from thirteen countries. The papers coalesce around five sub-themes: o approaches to choreography and performance o shifting cultural dance identities o contemporary research perspectives o changing dance pedagogies o site & environmental dance In exploring the cognitive and the sensory, the rational and the instinctive, the explicit and the implicit, these writings create and celebrate common and differentiated dance understandings — at times directly and provocatively, and at times liminally and poetically.
Resumo:
1. Under the Terms of Reference for the Committee’s Inquiry, ‘lemons’ are defined as ‘new motor vehicles with numerous, severe defects that re-occur despite multiple repair attempts or where defects have caused a new motor vehicle to be out of service for a prolonged period of time’. Consumers are currently protected in relation to lemon purchases by the Australian Consumer Law (ACL) located in Schedule 2 of the Competition and Consumer Act 2010 (Cth) (CCA). The ACL applies as a law of Queensland pursuant to the Fair Trading Act 1989 (Qld). The voluntary recall and consumer guarantees law took effect on 1 January 2011. 2. In 2006, the Government of Victoria made a commitment to introduce a lemon law into the provisions of the then Fair Trading Act 1999 (Vic). The public consultation process on the proposal to introduce a lemon law for motor vehicle purchases in Victoria was conducted by Ms Janice Munt MP, with the assistance of Consumer Affairs Victoria (CAV). CAV released an Issues Paper to canvas with industry and the community options for the development and introduction of a motor vehicle lemon law.(Consumer Affairs Victoria, Introducing Victorian motor vehicle lemon laws, Issues Paper, (September, 2007). 3. A CAV report prepared by Janice Munt MP was released in July, 2008 (Consumer Affairs Victoria, Motor Cars: A report on the motor vehicle lemon law consultations (July 2008) (Victorian Lemon Law Report). However, the Victorian proposal was overtaken by events leading to the adoption of a uniform consumer protection law in all Australian jurisdictions, the ACL. 4. The structure of this submission is to consider first the three different bases upon which consumers can obtain relief for economic loss arising from defects in motor vehicles. The second part of the submission considers the difficulties encountered by consumers in litigating motor vehicle disputes in the courts and tribunals. The third part of the submission examines the approach taken in other jurisdictions to resolving motor vehicle disputes. The final part of the submission considers a number of possible reforms that could be made to the existing law and its enforcement to reduce consumer detriment arising from the purchase of ‘lemon’ motor vehicles. 5. There are three principal bases upon which a consumer can obtain redress for defects in new motor vehicles under the ACL. The first is where the manufacturer admits liability and initiates the voluntary recall procedure provided for in s 128 of the ACL. Under this basis the manufacturer generally repairs or replaces the part subject to the recall free of charge. The second basis is where the manufacturer or dealer denies liability and the consumer is initiates proceedings in the court or tribunal seeking a statutory remedy under the ACL, the nature of which will depend on whether the failure to comply with the consumer guarantee was major or not. The third basis upon which a consumer can obtain redress is pursuant to public enforcement by the ACCC. Each basis will be considered in this part. What all three bases have in common is the need to conduct an investigation to identify the nature of the defect and how it arose.