195 resultados para 370.154
Resumo:
National Housing Relics and Scenic Sites (NHRSSs) in China are the equivalent of National Parks in the West but have contrasting features and broader roles when compared to their Western counterparts. By reviewing and analysing more than 370 academic sources, this paper identifies 6 major issue clusters and future challenges that will influence the management of NHRSSs over time. It also provides a number of cases to illustrate the particular features of NHRSSs. Identifying the hot issues and important challenges in Chinese NHRSSs will provide valuable insights into priorities now being discussed in highly populated areas of the World.
Resumo:
Attitudes and practices towards older workers were surveyed in Brisbane with 525 employees randomly sampled from the electoral roll and executives of 104 companies obtained by stratified random sampling from the Register of Workplaces (response rates, 60% and 80% respectively). The results indicated that “older workers” are young in terms of contemporary life expectancy, and younger for employers than employees; they have some desirable personal qualities (eg. loyalty), but are not perceived as adaptable; workers aged 25–39 were preferred on qualities held to be important in the workplace and there was minimal interest in recruiting anyone over 45 years.
Resumo:
Differential pulse stripping voltammetry method(DPSV) was applied to the determination of three herbicides, ametryn, cyanatryn, and dimethametryn. It was found that their voltammograms overlapped strongly, and it is difficult to determine these compounds individually from their mixtures. With the aid of chemometrics, classical least squares(CLS), principal component regression(PCR) and partial least squares(PLS), voltammogram resolution and quantitative analysis of the synthetic mixtures of the three compounds were successfully performed. The proposed method was also applied to the analysis of some real samples with satisfactory results.
Resumo:
In this paper an existing method for indoor Simultaneous Localisation and Mapping (SLAM) is extended to operate in large outdoor environments using an omnidirectional camera as its principal external sensor. The method, RatSLAM, is based upon computational models of the area in the rat brain that maintains the rodent’s idea of its position in the world. The system uses the visual appearance of different locations to build hybrid spatial-topological maps of places it has experienced that facilitate relocalisation and path planning. A large dataset was acquired from a dynamic campus environment and used to verify the system’s ability to construct representations of the world and simultaneously use these representations to maintain localisation.
Resumo:
Malaysian teachers are now using interactive courseware in their teaching practices as part of teaching activity in classroom, to teach some subjects such as languages, mathematics, and science. Towards this, there is some debate going on the effectiveness of interactive courseware used in classroom. This paper reports data from interviews conducted with school principals and teachers from six selected primary Smart Schools across Malaysia.The interview conducted is looked on their current school practices and challenges in the implementation of interactive courseware in the classroom. The interview covers several aspects of their school facilities, the causes attributed and their concerns. However, the findings revealed that these six schools generally need more supports in the physical and technical form, in order to utilize the interactive courseware. Initially, the current support from the Malaysian Ministry of Education in physical form has proved that not very helpful. Thus, the respondents suggested that supports should be both: physical and technical. Therefore, this preliminary findings could be used as a pointer to the Malaysian government and other stakeholders to the improvement of interface design for future interactive courseware.
Resumo:
It is nearly 10 years since the introduction of s 299(1)(f) Corporations Act , which requires the disclosure of information regarding a company's environmental performance within its annual report. This provision has generated considerable debate in the years since its introduction, fundamentally between proponents of either a voluntary or mandatory environmental reporting framework. This study examines the adequacy of the current regulatory framework. The environmental reporting practices of 24 listed companies in the resources industries are assessed relative to a standard set by the Global Reporting Initiative (GRI) Sustainability Reporting Guidelines. These Guidelines are argued to represent "international best practice" in environmental reporting and a "scorecard" approach is used to score the quality of disclosure according to this voluntary benchmark. Larger companies in the sample tend to report environmental information over and above the level required by legislation. Some, but not all companies present a stand-alone environmental/sustainability report. However, smaller companies provide minimal information in compliance with s 299(1)(f) . The findings indicate that "international best practice" environmental reporting is unlikely to be achieved by Australian companies under the current regulatory framework. In the current regulatory environment that scrutinises s 299(1)(f) , this article provides some preliminary evidence of the quality of disclosures generated in the Australian market.
Resumo:
Spectrum sensing is considered to be one of the most important tasks in cognitive radio. One of the common assumption among current spectrum sensing detectors is the full presence or complete absence of the primary user within the sensing period. In reality, there are many situations where the primary user signal only occupies a portion of the observed signal and the assumption of primary user duty cycle not necessarily fulfilled. In this paper we show that the true detection performance can degrade from the assumed achievable values when the observed primary user exhibits a certain duty cycle. Therefore, a two-stage detection method incorporating primary user duty cycle that enhances the detection performance is proposed. The proposed detector can improve the probability of detection under low duty cycle at the expense of a small decrease in performance at high duty cycle.
Resumo:
The authors present a Cause-Effect fault diagnosis model, which utilises the Root Cause Analysis approach and takes into account the technical features of a digital substation. The Dempster/Shafer evidence theory is used to integrate different types of fault information in the diagnosis model so as to implement a hierarchical, systematic and comprehensive diagnosis based on the logic relationship between the parent and child nodes such as transformer/circuit-breaker/transmission-line, and between the root and child causes. A real fault scenario is investigated in the case study to demonstrate the developed approach in diagnosing malfunction of protective relays and/or circuit breakers, miss or false alarms, and other commonly encountered faults at a modern digital substation.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
Background Cancer survivors face an increased likelihood of being subsequently diagnosed with another cancer. The aim of this study was to quantify the relative risk of survivors developing a second primary cancer in Queensland, Australia. Methods Standardised incidence rates stratified by type of first primary cancer, type of second primary cancer, sex, age at first diagnosis, period of first diagnosis and follow-up interval were calculated for residents of Queensland, Australia, who were diagnosed with a first primary invasive cancer between 1982 and 2001 and survived for a minimum of 2 months. Results A total of 23,580 second invasive primary cancers were observed over 1,370,247 years of follow-up among 204,962 cancer patients. Both males (SIR = 1.22; 95% CI = 1.20-1.24) and females (SIR = 1.36; 95% CI = 1.33-1.39) within the study cohort were found to have a significant excess risk of developing a second cancer relative to the incidence of cancer in the general population. The observed number of second primary cancers was also higher than expected within each age group, across all time periods and during each follow-up interval. Conclusions The excess risk of developing a second malignancy among cancer survivors can likely be attributed to factors including similar aetiologies, genetics and the effects of treatment, underlining the need for ongoing monitoring of cancer patients to detect subsequent tumours at an early stage. Education campaigns developed specifically for survivors may be required to lessen the prevalence of known cancer risk factors.
Resumo:
Automated feature extraction and correspondence determination is an extremely important problem in the face recognition community as it often forms the foundation of the normalisation and database construction phases of many recognition and verification systems. This paper presents a completely automatic feature extraction system based upon a modified volume descriptor. These features form a stable descriptor for faces and are utilised in a reversible jump Markov chain Monte Carlo correspondence algorithm to automatically determine correspondences which exist between faces. The developed system is invariant to changes in pose and occlusion and results indicate that it is also robust to minor face deformations which may be present with variations in expression.