689 resultados para Optimal public spending
Resumo:
In 2012 the New Zealand government spent $3.4 billion, or nearly $800 per person, on responses to crime via the justice system. Research shows that much of this spending does little to reduce the changes of re-offending. Relatively little money is spent on victims, the rehabilitation of offenders or to support the families of offenders. This book is based on papers presented at the Costs of Crime forum held by the Institute of Policy Studies in February 2011. It presents lessons from what is happening in Australia, Britain and the United States and focuses on how best to manage crime, respond to victims, and reduce offending in a cost-effective manner in a New Zealand context. It is clear that strategies are needed that are based on better research and a more informed approach to policy development. Such strategies must assist victims constructively while also reducing offending. Using public resources to lock as many people in our prisons as possible cannot be justified by the evidence and is fiscally unsustainable; nor does such an approach make society safer. To reduce the costs of crime we need to reinvest resources in effective strategies to build positive futures for those at risk and the communities needed to sustain them.
Resumo:
Executive Summary Emergency Departments (EDs) locally, nationally and internationally are becoming increasingly busy. Within this context, it can be challenging to deliver a health service that is safe, of high quality and cost-effective. Whilst various models are described within the literature that aim to measure ED ‘work’ or ‘activity’, they are often not linked to a measure of costs to provide such activity. It is important for hospital and ED managers to understand and apply this link so that optimal staffing and financial resourcing can be justifiably sought. This research is timely given that Australia has moved towards a national Activity Based Funding (ABF) model for ED activity. ABF is believed to increase transparency of care and fairness (i.e. equal work receives equal pay). ABF involves a person-, performance- or activity-based payment system, and thus a move away from historical “block payment” models that do not incentivise efficiency and quality. The aim of the Statewide Workforce and Activity-Based Funding Modelling Project in Queensland Emergency Departments (SWAMPED) is to identify and describe best practice Emergency Department (ED) workforce models within the current context of ED funding that operates under an ABF model. The study is comprised of five distinct phases. This monograph (Phase 1) comprises a systematic review of the literature that was completed in June 2013. The remaining phases include a detailed survey of Queensland hospital EDs’ resource levels, activity and operational models of care, development of new resource models, development of a user-friendly modelling interface for ED mangers, and production of a final report that identifies policy implications. The anticipated deliverable outcome of this research is the development of an ABF based Emergency Workforce Modelling Tool that will enable ED managers to profile both their workforce and operational models of care. Additionally, the tool will assist with the ability to more accurately inform adequate staffing numbers required in the future, inform planning of expected expenditures and be used for standardisation and benchmarking across similar EDs. Summary of the Findings Within the remit of this review of the literature, the main findings include: 1. EDs are becoming busier and more congested Rising demand, barriers to ED throughput and transitions of care all contribute to ED congestion. In addition requests by organisational managers and the community require continued broadening of the scope of services required of the ED and further increases in demand. As the population live longer with more lifestyle diseases their propensity to require ED care continues to grow. 2. Various models of care within EDs exist Models often vary to account for site specific characteritics to suit staffing profile, ED geographical location (e.g. metropolitan or rural site), and patient demographic profile (e.g. paediatrics, older persons, ethnicity). Existing and new models implemented within EDs often depend on the target outcome requiring change. Generally this is focussed on addressing issues at the input, throughput or output areas of the ED. Even with models targeting similar demographic or illness, the structure and process elements underpinning the model can vary, which can impact on outcomes and variance to the patient and carer experience between and within EDs. Major models of care to manage throughput inefficiencies include: A. Workforce Models of Care focus on the appropriate level of staffing for a given workload to provide prompt, timely and clinically effective patient care within an emergency care setting. The studies reviewed suggest that the early involvement of senior medical decision maker and/or specialised nursing roles such as Emergency Nurse Practitioners and Clinical Initiatives Nurse, primary contact or extended scope Allied Health Practitioners can facilitate patient flow and improve key indicators such as length of stay and reducing the number of those who did not wait to be seen amongst others. B. Operational Models of Care within EDs focus on mechanisms for streaming (e.g. fast-tracking) or otherwise grouping patient care based on acuity and complexity to assist with minimising any throughput inefficiencies. While studies support the positive impact of these models in general, it appears that they are most effective when they are adequately resourced. 3. Various methods of measuring ED activity exist Measuring ED activity requires careful consideration of models of care and staffing profile. Measuring activity requires the ability to account for factors including: patient census, acuity, LOS, intensity of intervention, department skill-mix plus an adjustment for non-patient care time. 4. Gaps in the literature Continued ED growth calls for new and innovative care delivery models that are safe, clinically effective and cost effective. New roles and stand-alone service delivery models are often evaluated in isolation without considering the global and economic impact on staffing profiles. Whilst various models of accounting for and measuring health care activity exist, costing studies and cost effectiveness studies are lacking for EDs making accurate and reliable assessments of care models difficult. There is a necessity to further understand, refine and account for measures of ED complexity that define a workload upon which resources and appropriate staffing determinations can be made into the future. There is also a need for continued monitoring and comprehensive evaluation of newly implemented workforce modelling tools. This research acknowledges those gaps and aims to: • Undertake a comprehensive and integrated whole of department workforce profiling exercise relative to resources in the context of ABF. • Inform workforce requirements based on traditional quantitative markers (e.g. volume and acuity) combined with qualitative elements of ED models of care; • Develop a comprehensive and validated workforce calculation tool that can be used to better inform or at least guide workforce requirements in a more transparent manner.
Resumo:
This paper presents an optimisation algorithm to maximize the loadability of single wire earth return (SWER) by minimizing the cost of batteries and regulators considering the voltage constraints and thermal limits. This algorithm, that finds the optimum location of batteries and regulators, uses hybrid discrete particle swarm optimization and mutation (DPSO + Mutation). The simulation results on realistic highly loaded SWER network show the effectiveness of using battery to improve the loadability of SWER network in a cost-effective way. In this case, while only 61% of peak load can be supplied without violating the constraints by existing network, the loadability of the network is increased to peak load by utilizing two battery sites which are located optimally. That is, in a SWER system like the studied one, each installed kVA of batteries, optimally located, supports a loadability increase as 2 kVA.
Resumo:
This paper describes a novel optimum path planning strategy for long duration AUV operations in environments with time-varying ocean currents. These currents can exceed the maximum achievable speed of the AUV, as well as temporally expose obstacles. In contrast to most other path planning strategies, paths have to be defined in time as well as space. The solution described here exploits ocean currents to achieve mission goals with minimal energy expenditure, or a tradeoff between mission time and required energy. The proposed algorithm uses a parallel swarm search as a means to reduce the susceptibility to large local minima on the complex cost surface. The performance of the optimisation algorithms is evaluated in simulation and experimentally with the Starbug AUV using a validated ocean model of Brisbane’s Moreton Bay.
Resumo:
Many emerging economies are dangling the patent system to stimulate bio-technological innovations with the ultimate premise that these will improve their economic and social growth. The patent system mandates full disclosure of the patented invention in exchange of a temporary exclusive patent right. Recently, however, patent offices have fallen short of complying with such a mandate, especially for genetic inventions. Most patent offices provide only static information about disclosed patent sequences and even some do not keep track of the sequence listing data in their own database. The successful partnership of QUT Library and Cambia exemplifies advocacy in Open Access, Open Innovation and User Participation. The library extends its services to various departments within the university, builds and encourages research networks to complement skills needed to make a contribution in the real world.
Resumo:
This article reports on the outcomes of small group deliberations on levels of punitiveness and public confidence in the sentencing functions of Australian criminal courts, conducted as part of a larger project investigating public attitudes to sentencing. One hypothesis of the project as a whole was that a more informed and involved public is likely to be less punitive in their views on the sentencing of offenders, and to express less cynical views about the role of sentencing courts. The aim of the small group deliberations as part of the broader project was to engender a more thoughtful and considered approach by participants to issues around sentencing. It was hypothesised that the opportunity to discuss, deliberate and consider would lead to a measurable reduction in punitiveness and an increase in people’s confidence in the courts. While the results do indeed indicate such changes in attitudes, the current study also shed light on some of the conceptual, methodological and practical challenges inherent in this type of research.
Resumo:
Distributed generation (DG) resources are commonly used in the electric systems to obtain minimum line losses, as one of the benefits of DG, in radial distribution systems. Studies have shown the importance of appropriate selection of location and size of DGs. This paper proposes an analytical method for solving optimal distributed generation placement (ODGP) problem to minimize line losses in radial distribution systems using loss sensitivity factor (LSF) based on bus-injection to branch-current (BIBC) matrix. The proposed method is formulated and tested on 12 and 34 bus radial distribution systems. The classical grid search algorithm based on successive load flows is employed to validate the results. The main advantages of the proposed method as compared with the other conventional methods are the robustness and no need to calculate and invert large admittance or Jacobian matrices. Therefore, the simulation time and the amount of computer memory, required for processing data especially for the large systems, decreases.
Resumo:
2012 saw the publication of competing and complementary lines of Australian “classics”: “A&R Australian Classics” (HarperCollins) and “Text Classics” (Text Publishing). While Angus and Robertson were key in establishing a canon of Australian children’s classics in the twentieth century, it was the Text Classics line which included a selection of young people’s titles in their 2013. In turn, Penguin Australia launched a selection of “Australian Children’s Classics”. In so doing, these publishers were drawing on particular literary and visual cultural traditions in Australian children’s literature. Public assertions of a particular selection of children’s books reveals not only contemporary assumptions about desirable childhood experiences but about the operation of nostalgia therein. In encouraging Australian adults to judge books by their covers, such gestures imply that Australian children may be similarly understood. Importantly, the illusion of unity, sameness, and legibility which is promised by circumscribed canons of “classic” children’s literature may well imply a desire for similarly illusory, unified, legible, “classic” childhood. This paper attends to public attempts to materialise (and legitimise) a canon of classic Australian children’s literature. In particular, it considers the ways in which publishing, postage stamps, and book awards make visible a range of children’s books, but do so in order to either fix or efface the content or meaning of the books themselves. Moving between assertions of the best books for children from the 1980s to today, and of the social values circulated within those books, this paper considers the possibilities and problematics of an Australian children’s canon.
Nutritional influences over the life course on lean body mass of individuals in developing countries
Resumo:
The double burden of childhood undernutrition and adult-onset adiposity in transitioning societies poses a significant public health challenge. The development of suboptimal lean body mass (LBM) could partly explain the link between these two forms of malnutrition. This review examines the evidence on both the role of nutrition in “developmental programming” of LBM and the nutritional influences that affect LBM throughout the life course. Studies from developing countries assessing the relationship of early nutrition with later LBM provide important insights. Overall, the evidence is consistent in suggesting a positive association of early nutritional status (indicated by birth weight and growth during first 2 years) with LBM in later life. Evidence on the impact of maternal nutritional supplementation during pregnancy on later LBM is inconsistent. In addition, the role of nutrients (protein, zinc, calcium, vitamin D) that can affect LBM throughout the life course is described. Promoting optimal intakes of these important nutrients throughout the life course is important for reducing childhood undernutrition as well as for improving the LBM of adults.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
Construction delay has been a protracted problem for the Malaysian construction industry. Recent report showed that 80% of public sector projects are behind schedule. This underachieving time performance has led to many problems including public complaints, loss of reputation and revenue for the government and a slump in the industry’s GDP contribution. Research in the area of project delay has mushroomed worldwide with attempts to place mitigation plans, but delay remains a global phenomenon. There is now an urgent need for revolutionizing construction practices and past research, backed up with few successful cases suggests that Supply Chain Management (SCM) could prove beneficial to reduce or eliminate delays in construction. SCM which originated from the automotive manufacturing industry promotes a more collaborative approach to construction management and has recently gained attention of the construction industry. However every country, including Malaysia, would certainly have disparities of their own compared to others being it from the cultural point of view, nature of problems, locality or improvements needed. Therefore, this paper will present part of a Ph.D. research which aims at illustrating the Malaysian construction industry experts’ perception of the Malaysian public sector project delay, provide insight into these dilemmas, highlights the problems with current practices, its effects and the improvements needed. Subsequently, this paper would propose ratification to the problems using SCM. A semi-structured interview has been conducted to practitioners with at least 20 years’ experience in the industry. The findings showed that Malaysia may be unique compared to other countries and that by considering a number of additional factors, SCM could prove beneficial to increase efficiency of the Malaysian public sector projects.
Resumo:
In this essay, we outline an emerging form of public intellectualism in the humanities sector of Australian higher education. We argue that debates over public intellectualism and its relation to the academy in Australia have largely been focused on the tension between polemics and politics. These debates have also tended to ignore or overlook policy drivers within the sector and alternative or new media sites of public intellectualism. Shifting the focus towards policy drivers in the knowledge economy—such as knowledge transfer and third-stream funding—and understanding the nature of the university as a public sphere in itself reveals a new economy of the public intellectual as a professional knowledge worker. This new economy, we argue, may well render obsolete many of the previous debates over public intellectualism in the humanities. However, we anticipate that it will generate new debates over the relationship between the individual and the institutional, and between the concepts of public profile and public role—debates that will affect, in particular, early career academics who are the inheritors of this new economy of the public intellectual.
Resumo:
This article investigates the discourses of academic legitimacy that surround the production, consumption, and accreditation of online scholarship. Using the web-based media and cultural studies journal (http://journal.media-culture.org.au) as a case study, it examines how online scholarly journals often position themselves as occupying a space between the academic and the popular and as having a functional advantage over print-based media in promoting a spirit of public intellectualism. The current research agenda of both government and academe prioritises academic research that is efficient, self-promoting, and relevant to the public. Yet, although the cost-effectiveness and public-intellectual focus of online scholarship speak to these research priorities, online journals such as M/C Journal have occupied, and continue to occupy, an unstable position in relation to the perceived academic legitimacy of their content. Although some online scholarly journals have achieved a limited form of recognition within a system of accreditation that still privileges print-based scholarship, I argue that this, nevertheless, points to the fact that traditional textual notions of legitimate academic work continue to pervade the research agenda of an academe that increasingly promotes flexible delivery of teaching and online research initiatives.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.