262 resultados para Hold harmless
Resumo:
We investigated the key beliefs to target in interventions aimed at increasing physical activity (PA) among mothers and fathers of young children. Parents (288 mothers and 292 fathers) completed a Theory of Planned Behaviour belief-based questionnaire and a 1-week follow-up of PA behaviour. We found that a range of behavioural, normative, and control beliefs were significantly correlated with parents’ PA intentions and behaviour, with only a few differences observed in correlations between PA beliefs and intention and behaviour by gender. A range of key beliefs was identified as making independent contributions to parents’ PA intentions; however, the behavioural beliefs about improving parenting practices (β = 0.13), interfering with other commitments (β = −0.29); normative beliefs about people I exercise with (β = 0.20); and control beliefs about lack of time (β = −0.24), inconvenience (β = −0.14), lack of motivation (β = −0.34), were revealed as significant independent predictors of actual PA behaviour. Furthermore, we found that a limited amount of parents already hold these beliefs, suggesting that these key beliefs warrant changing and, therefore, are appropriate targets for subsequent intervention. The current study fills an empirical gap in the PA literature by investigating an at-risk group and using a well established theoretical framework to identify key beliefs that guide parents’ PA decision-making. Overall, we found support for parents being a unique group who hold distinctive behavioural, normative, and control beliefs toward PA. Attention to these key underlying beliefs will assist intervention work aimed at combating inactivity among this at-risk population.
Resumo:
This study aims to benchmark Chinese TEFL academics’ research productivities, as a way to identify and, subsequently, address research productivity issues. This study investigated 182 Chinese TEFL academics’ research outputs and perceptions about research across three Chinese higher education institutions using a literature-based survey. ANOVA, t-tests and descriptive statistics were used to analyse data from and between the three institutions. Findings indicated that more than 70% of the TEFL academics had produced no research in 10 of the 12 research output fields during 2004-2008. The English Language and Literature Department in the national university outperformed all other departments at the three institutes for most of the research output categories. While a majority of the participants seemed to hold positive perceptions about research, t-tests and ANOVA indicated that their research perceptions were significantly different across institutes and departments. Developing TEFL research capacity requires tertiary institutions to provide research-learning opportunities.
Resumo:
A simple mathematical model is presented to describe the cell separation process that plants undertake in order to deliberately shed organs. The focus here is on modelling the production of the enzyme polygalacturonase, which breaks down pectin that provides natural cell-to-cell adhesion in the localised abscission zone. A coupled system of three ordinary differential equations is given for a single cell, and then extended to hold for a layer of cells in the abscission zone. Simple observations are made based on the results of this preliminary model and, furthermore, a number of opportunities for applied mathematicians to make contributions in this subject area are discussed.
Resumo:
Numerous difficulties are associated with the conduct of preclinical studies related to skin and wound repair. Use of small animal models such as rodents is not optimal because of their physiological differences to human skin and mode of wound healing. Although pigs have previously been used because of their human-like mode of healing, the expense and logistics related to their use also renders them suboptimal. In view of this, alternatives are urgently required to advance the field. The experiments reported herein were aimed at developing and validating a simple, reproducible, three-dimensional ex vivo de-epidermised dermis human skin equivalent wound model for the preclinical evaluation of novel wound therapies. Having established that the human skin equivalent wound model does in fact “heal," we tested the effect of two novel wound healing therapies. We also examined the utility of the model for studies exploring the mechanisms underpinning these therapies. Taken together the data demonstrate that these new models will have wide-spread application for the generation of fundamental new information on wound healing processes and also hold potential in facilitating preclinical optimization of dosage, duration of therapies, and treatment strategies prior to clinical trials.
Resumo:
The purpose of the paper is to provide a collaborative practitioner/academic interpretation of a destination’s competitiveness through the lens of brand positioning in the domestic short break drive market. A 173 item questionnaire, which was mailed to a systematic random sample of 3000 households in the target market, attracted a 17% useable response. The paper compares how one destination, the Sunshine Coast, is positioned in its most important market, in relation to the brand identity intended by the destination marketing organisation (DMO). Key constructs were brand salience, brand associations and brand resonance. The Sunshine Coast was found to hold a leadership position in the minds of consumers, and the results indicated a strong level of congruence between actual market perceptions and the brand identity intended by the DMO. There were strong associations between brand salience, brand associations and brand resonance. The findings provided the destination of interest with both a measure of past marketing effectiveness as well as positive indicators of future performance. The paper represents collaboration between a tourism practitioner and a tourism academic, and attempts a contribution to the emerging literature on destination competitiveness through the lens of positioning theory.
Resumo:
This paper reviews the status of alcohol, drugs and traffic safety in Australia, with particular emphasis on developments in the period 2008-2010. Australian jurisdictions have made impressive improvements in road safety since the early 1970s. Enforcement and public education campaigns that specifically target drink driving have been successful, with resultant long-term reduction in alcohol-related fatalities. There is a high level of community disapproval of drink driving and strong support for countermeasures. Many best-practice countermeasures targeting impaired driving are in place, including general prevention/ deterrence programs such as random breath testing (RBT), random roadside drug testing legal alcohol limits, responsible service of alcohol programs, public education and advertising campaigns and designated driver programs, and offender management programs such as driver licensing penalties and fines, alcohol ignition interlocks and vehicle impoundment for high risk drink drivers, and offender education programs. There continue to be enhancements occurring, particularly in the areas of drug-impaired driving and offender management, but also in addressing the fundamental policy and legislative framework to address impaired driving (e.g., a current national debate about lowering the permissible blood alcohol for all drivers from 0.05 to 0.02 or 0.00 gm/100 ml BAC). However, there are major challenges that may be impacting on programs targeting impaired driving, including the rapid development of a binge drinking culture among young Australians, the extension of trading hours of licensed premises, continued problems with secondary supply of alcohol to minors, and increases in the marketing of alcopops and ready-to-drink spirit-based beverages. This paper addresses the question: Are impaired driving countermeasures in Australia continuing to achieve reductions in road traumas and rates of offending, or are they plateauing? If they are plateauing, is this due to declining effectiveness of countermeasures or the need to ‘hold the line’ against societal influences encouraging impaired driving?
Resumo:
In many product categories of durable goods such as TV, PC, and DVD player, the largest component of sales is generated by consumers replacing existing units. Aggregate sales models proposed by diffusion of innovation researchers for the replacement component of sales have incorporated several different replacement distributions such as Rayleigh, Weibull, Truncated Normal and Gamma. Although these alternative replacement distributions have been tested using both time series sales data and individual-level actuarial “life-tables” of replacement ages, there is no census on which distributions are more appropriate to model replacement behaviour. In the current study we are motivated to develop a new “modified gamma” distribution by two reasons. First we recognise that replacements have two fundamentally different drivers – those forced by failure and early, discretionary replacements. The replacement distribution for each of these drivers is expected to be quite different. Second, we observed a poor fit of other distributions to out empirical data. We conducted a survey of 8,077 households to empirically examine models of replacement sales for six electronic consumer durables – TVs, VCRs, DVD players, digital cameras, personal and notebook computers. This data allows us to construct individual-level “life-tables” for replacement ages. We demonstrate the new modified gamma model fits the empirical data better than existing models for all six products using both a primary and a hold-out sample.
Resumo:
Generally speaking, psychologists have suggested three traditional views of how people cope with uncertainty. They are the certainty maximiser, the intuitive statistician-economist and the knowledge seeker (Smithson, 2008). In times of uncertainty, such as the recent global financial crisis, these coping methods often result in innovation in industry. Richards (2003) identifies innovation as different from creativity in that innovation aims to transform and implement rather than simply explore and invent. An examination of the work of iconic fashion designers, through case study and situational analysis, reveals that coping with uncertainty manifests itself in ways that have resulted in innovations in design, marketing methods, production and consumption. In relation to contemporary fashion, where many garments look the same in style, colour, cut and fit (Finn, 2008), the concept of innovation is an important one. This paper explores the role of uncertainty as a driver of innovation in fashion design. A key aspect of seeking knowledge, as a mechanism to cope with this uncertainty, is a return to basics. This is a problem for contemporary fashion designers who are no longer necessarily makers and therefore do not engage with the basic materials and methods of garment construction. In many cases design in fashion has become digital, communicated to an unseen, unknown production team via scanned image and specification alone. The disconnection between the design and the making of garments, as a result of decades of off-shore manufacturing, has limited the opportunity for this return to basics. The authors argue that the role of the fashion designer has become about the final product and as a result there is a lack of innovation in the process of making: in the form, fit and function of fashion garments. They propose that ‘knowledge seeking’ as a result of uncertainty in the fashion industry, in particular through re-examination of the methods of making, could hold the key to a new era of innovation in fashion design.
Resumo:
Cognitive load theory was used to generate a series of three experiments to investigate the effects of various worked example formats on learning orthographic projection. Experiments 1 and 2 investigated the benefits of presenting problems, conventional worked examples incorporating the final 2-D and 3-D representations only, and modified worked examples with several intermediate stages of rotation between the 2-D and 3-D representations. Modified worked examples proved superior to conventional worked examples without intermediate stages while conventional worked examples were, in turn, superior to problems. Experiment 3 investigated the consequences of varying the number and location of intermediate stages in the rotation trajectory and found three stages to be superior to one. A single intermediate stage was superior when nearer the 2-D than the 3-D end of the trajectory. It was concluded that (a) orthographic projection is learned best using worked examples with several intermediate stages and that (b) a linear relation between angle of rotation and problem difficulty did not hold for orthographic projection material. Cognitive load theory could be used to suggest the ideal location of the intermediate stages.
Resumo:
This paper develops a general theory of validation gating for non-linear non-Gaussian mod- els. Validation gates are used in target tracking to cull very unlikely measurement-to-track associa- tions, before remaining association ambiguities are handled by a more comprehensive (and expensive) data association scheme. The essential property of a gate is to accept a high percentage of correct associ- ations, thus maximising track accuracy, but provide a su±ciently tight bound to minimise the number of ambiguous associations. For linear Gaussian systems, the ellipsoidal vali- dation gate is standard, and possesses the statistical property whereby a given threshold will accept a cer- tain percentage of true associations. This property does not hold for non-linear non-Gaussian models. As a system departs from linear-Gaussian, the ellip- soid gate tends to reject a higher than expected pro- portion of correct associations and permit an excess of false ones. In this paper, the concept of the ellip- soidal gate is extended to permit correct statistics for the non-linear non-Gaussian case. The new gate is demonstrated by a bearing-only tracking example.
Resumo:
This article examines the problem of patent ambush in standard setting, where patent owners are sometimes able to capture industry standards in order to secure monopoly power and windfall profits. Because standardisation generally introduces high switching costs, patent ambush can impose significant costs on downstream manufacturers and consumers and drastically reduce the efficiency gains of standardisation.This article considers how Australian competition law is likely to apply to patent ambush both in the development of a standard (through misrepresenting the existence of an essential patent) and after a standard is implemented (through refusing to license an essential patented technology either at all or on reasonable and non-discriminatory (RAND) terms). This article suggests that non-disclosure of patent interests is unlikely to restrained by Part IV of the Trade Practices Act (TPA), and refusals to license are only likely to be restrained if the refusal involves leveraging or exclusive dealing. By contrast, Standard Setting Organisations (SSOs) which seek to limit this behaviour through private ordering may face considerable scrutiny under the new cartel provisions of the TPA. This article concludes that SSOs may be best advised to implement administrative measures to prevent patent hold-up, such as reviewing which patents are essential for the implementation of a standard, asking patent holders to make their licence conditions public to promote transparency, and establishing forums where patent licensees can complain about licence terms that they consider to be unreasonable or discriminatory. Additionally, the ACCC may play a role in authorising SSO policies that could otherwise breach the new cartel provisions, but which have the practical effect of promoting competition in the standards setting environment.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
The heterogeneous photocatalytic oxidation process offers a versatile promise in the detoxification and disinfection of wastewater containing hazardous organic compounds such as pesticides and phenolic compounds in storm and wastewater effluent. This process has gained wide attention due to its effectiveness in degrading and mineralizing the organic compounds into harmless and often useful components. To develop an efficient photocatalytic process, titanium dioxide has been actively studied in recent years due to its excellent performance as a photocatalyst under UV light irradiation. This paper aims at critically evaluating and highlighting the recent developments of the heterogeneous photocatalytic systems with a special focus on storm and wastewater treatment applications.
Resumo:
Practitioners will be aware that s 366 (1) of the Property Agents and Motor Dealers Act 2000 provides that a relevant contract must have attached, as its first or top sheet, a warning statement in the approved form. A failure to attach a warning statement in the prescribed manner triggers a right of termination in the buyer. The factual circumstances in Devine Ltd v Timbs [2004] QSC 24 are indicative of the problems that may arise in the construction of this statutory provision. The application concerned put and call option agreements entered into concerning 4 lots. The agreements, in identical terms, were signed before the applicant seller had completed a proposed residential apartment building. In each case the option agreement provided that the agreement was not binding on the seller until and unless the purchaser returned to the seller, amongst other things, two copies of the warning statement under the Property Agents and Motor Dealers Ac 2000 signed by the purchaser and two copies of the contract document signed by the purchaser. The seller was required to hold the contract documentation in escrow and was forbidden to sign it until and unless either option was exercised.
Resumo:
While using unmanned systems in combat is not new, what will be new in the foreseeable future is how such systems are used and integrated in the civilian space. The potential use of Unmanned Aerial Vehicles in civil and commercial applications is becoming a fact, and is receiving considerable attention by industry and the research community. The majority of Unmanned Aerial Vehicles performing civilian tasks are restricted to flying only in segregated space, and not within the National Airspace. The areas that UAVs are restricted to flying in are typically not above populated areas, which in turn are the areas most useful for civilian applications. The reasoning behind the current restrictions is mainly due to the fact that current UAV technologies are not able to demonstrate an Equivalent Level of Safety to manned aircraft, particularly in the case of an engine failure which would require an emergency or forced landing. This chapter will preset and guide the reader through a number of developments that would facilitate the integration of UAVs into the National Airspace. Algorithms for UAV Sense-and-Avoid and Force Landings are recognized as two major enabling technologies that will allow the integration of UAVs in the civilian airspace. The following sections will describe some of the techniques that are currently being tested at the Australian Research Centre for Aerospace Automation (ARCAA), which places emphasis on the detection of candidate landing sites using computer vision, the planning of the descent path trajectory for the UAV, and the decision making process behind the selection of the final landing site.