235 resultados para Beauty operators
Resumo:
This paper sets out to examine from published literature and crash data analyses whether alcohol in bicycle crashes is an issue about which we should be concerned. It discusses factors that have the potential to increase the number of bicycle crashes in which alcohol is involved (such growth in the size and diversity of the cyclist population, and balance and coordination demands) and factors which may reduce the importance of alcohol in bicycle crashes (such as time of data factors and child riders). It also examines data availability issues that contribute to difficulties in determining the true magnitude of the issue. Methods: This paper reviews previous research and reports analyses of data from Queensland, Australia, that examine the role of alcohol in Police-reported road crashes. In Queensland it is an offence to ride a bicycle or drive a motor vehicle with a BAC exceeding 0.05% (or lower for novice and professional drivers). Results: In the five years 2003-2007, alcohol was reported as involved in 165 bicycle crashes (4%). The bicycle rider was coded as “under the influence” or “over the prescribed BAC limit” in 15 were single unit crashes (12%). In multi-vehicle bicycle crashes, alcohol involvement was reported for 16 cyclists (0.4%) and 110 operators of other vehicles (3%). Additional analyses including characteristics of the cyclist crashes involving alcohol and the importance of missing data will be discussed in the paper. Conclusion: The increase in participation in cycling and the vulnerability of cyclists to injuries support the need to examine the role of alcohol in bicycle crashes. Current data suggest that alcohol on the part of the vehicle driver is a larger concern than alcohol on the part of the cyclist, but improvements in data collection are needed before more precise conclusions can be drawn.
Resumo:
Operators of busy contemporary airports have to balance tensions between the timely flow of passengers, flight operations, the conduct of commercial business activities and the effective application of security processes. In addition to specific onsite issues airport operators liaise with a range of organisations which set and enforce aviation-related policies and regulations as well as border security agencies responsible for customs, quarantine and immigration, in addition to first response security services. The challenging demands of coordinating and planning in such complex socio-technical contexts place considerable pressure on airport management to facilitate coordination of what are often conflicting goals and expectations among groups that have standing in respect to safe and secure air travel. What are, as yet, significantly unexplored issues in large airports are options for the optimal coordination of efforts from the range of public and private sector participants active in airport security and crisis management. A further aspect of this issue is how airport management systems operate when there is a transition from business-as-usual into an emergency/crisis situation and then, on recovery, back to ‘normal’ functioning. Business Continuity Planning (BCP), incorporating sub-plans for emergency response, continuation of output and recovery of degraded operating capacity, would fit such a context. The implementation of BCP practices in such a significant high security setting offers considerable potential benefit yet entails considerable challenges. This paper presents early results of a 4 year nationally funded industry-based research project examining the merger of Business Continuity Planning and Transport Security Planning as a means of generating capability for improved security and reliability and, ultimately, enhanced resilience in major airports. The project is part of a larger research program on the Design of Secure Airports that includes most of the gazetted ‘first response’ international airports in Australia, key Aviation industry groups and all aviation-related border and security regulators as collaborative partners. The paper examines a number of initial themes in the research, including: ? Approaches to integrating Business Continuity & Aviation Security Planning within airport operations; ? Assessment of gaps in management protocols and operational capacities for identifying and responding to crises within and across critical aviation infrastructure; ? Identification of convergent and divergent approaches to crisis management used across Austral-Asia and their alignment to planned and possible infrastructure evolution.
Resumo:
This paper presents Multi-Step A* (MSA*), a search algorithm based on A* for multi-objective 4D vehicle motion planning (three spatial and one time dimension). The research is principally motivated by the need for offline and online motion planning for autonomous Unmanned Aerial Vehicles (UAVs). For UAVs operating in large, dynamic and uncertain 4D environments, the motion plan consists of a sequence of connected linear tracks (or trajectory segments). The track angle and velocity are important parameters that are often restricted by assumptions and grid geometry in conventional motion planners. Many existing planners also fail to incorporate multiple decision criteria and constraints such as wind, fuel, dynamic obstacles and the rules of the air. It is shown that MSA* finds a cost optimal solution using variable length, angle and velocity trajectory segments. These segments are approximated with a grid based cell sequence that provides an inherent tolerance to uncertainty. Computational efficiency is achieved by using variable successor operators to create a multi-resolution, memory efficient lattice sampling structure. Simulation studies on the UAV flight planning problem show that MSA* meets the time constraints of online replanning and finds paths of equivalent cost but in a quarter of the time (on average) of vector neighbourhood based A*.
Resumo:
Forget Disney's timeless tales of rags-to-riches. Princesses are the most overrated public figures of all time. Apparently. Cinderella, after all, was 'a calculating, sinister go-getter' who murdered her step-mother at the instruction of a jealous governess (88). Sleeping Beauty was raped as she slept, woken not by the wet kiss of a handsome prince, but the kick and punch of twins stirring in her belly. Over the centuries, only the pea-detecting princess has remained herself: hedonistic, melodramatic and 'still perhaps the most pampered, precious wimp in the history of fairy tales' (88). There are, however, shards of truth to be salvaged from the fractured lives of these glassy-eyed women. After all, even Princess Mary worked in real estate.
Resumo:
Designed for independent living, retirement villages provide either detached or semi-detached residential dwellings with car parking and small private yards. Retirement village developments usually include a mix of independent living units (ILUs) and serviced apartments (SAs) with community facilities providing a shared congregational area for village activities and socialising. Retirement Village assets differ from traditional residential assets due to their operation in accordance with statutory legislation. In Australia, each State and Territory has its own Retirement Village Act and Regulations. In essence, the village operator provides the land and buildings to the residents who pay an amount on entry for the right of occupation. On departure from the units an agreed proportion of either the original purchase price or the sale price is paid to the outgoing resident. The market value of the operator’s interest in the Retirement Village is therefore based upon the estimated future income from Deferred Management Fees and Capital Gain upon roll-over receivable by the operator in accordance with the respective residency agreements. Given the lumpiness of these payments, there is general acceptance that the most appropriate approach to valuation is through Discounted Cash Flow (DCF) analysis. There is however inconsistency between valuers across Australia in how they undertake their DCF analysis, leading to differences in reported values and subsequent confusion among users of valuation services. To give guidance to valuers and enhance confidence from users of valuation services this paper investigates the five major elements of discounted cash flow methodology, namely cash flows, escalation factors, holding period, terminal value and discount rate. Whilst there is dissatisfaction with the financial structuring of the DMF in residency agreements, as long as there are future financial returns receivable by the Village owner/operator, then DCF will continue to be the most appropriate valuation methodology for resident funded retirement villages.
Resumo:
Aurora, an illustrated novella, is a retelling of the classic fairytale Sleeping Beauty, set on the Australian coast around the grounds of the family lighthouse. Instead of following in the footsteps of tradition, this tale focuses on the long time Aurora is cursed to sleep by the malevolent Minerva; we follow Aurora as she voyages into the unconscious. Hunted by Minerva through the shifting landscape of her dreams, Aurora is dogged by a nagging pull towards the light—there is something she has left behind. Eventually, realising she must face Minerva to break the curse, they stage a battle of the minds in which Aurora triumphs, having grasped the power of her thoughts, her words. Aurora, an Australian fairytale, is a story of self-empowerment, the ability to shape destiny and the power of the mind. The exegesis examines a two-pronged question: is the illustrated book for young adults—graphic novel—relevant to a contemporary readership, and, is the graphic novel, where text and image intersect, a suitably specular genre in which to explore the unconscious? It establishes the language of the unconscious and the meaning of the term ‘graphic novel’, before investigating the place of the illustrated book for an older readership in a contemporary market, particularly exploring visual literacy and the way text and image—a hybrid narrative—work together. It then studies the aptitude of graphic literature to representing the unconscious and looks at two pioneers of the form: Audrey Niffenegger, specifically her visual novel The Three Incestuous Sisters, and Shaun Tan, and his graphic novel The Arrival. Finally, it reflects upon the creative work, Aurora, in light of three concerns: how best to develop a narrative able to relay the dreaming story; how to bestow a certain ‘Australianess’ upon the text and images; and the dilemma of designing an illustrated book for an older readership.
Resumo:
On obstacle-cluttered construction sites, understanding the motion characteristics of objects is important for anticipating collisions and preventing accidents. This study investigates algorithms for object identification applications that can be used by heavy equipment operators to effectively monitor congested local environment. The proposed framework contains algorithms for three-dimensional spatial modeling and image matching that are based on 3D images scanned by a high-frame rate range sensor. The preliminary results show that an occupancy grid spatial modeling algorithm can successfully build the most pertinent spatial information, and that an image matching algorithm is best able to identify which objects are in the scanned scene.
Resumo:
This paper presents a modified approach to evaluate access control policy similarity and dissimilarity based on the proposal by Lin et al. (2007). Lin et al.'s policy similarity approach is intended as a filter stage which identifies similar XACML policies that can be analysed further using more computationally demanding techniques based on model checking or logical reasoning. This paper improves the approach of computing similarity of Lin et al. and also proposes a mechanism to calculate a dissimilarity score by identifying related policies that are likely to produce different access decisions. Departing from the original algorithm, the modifications take into account the policy obligation, rule or policy combining algorithm and the operators between attribute name and value. The algorithms are useful in activities involving parties from multiple security domains such as secured collaboration or secured task distribution. The algorithms allow various comparison options for evaluating policies while retaining control over the restriction level via a number of thresholds and weight factors.
Resumo:
This paper considers the problem of building a software architecture for a human-robot team. The objective of the team is to build a multi-attribute map of the world by performing information fusion. A decentralized approach to information fusion is adopted to achieve the system properties of scalability and survivability. Decentralization imposes constraints on the design of the architecture and its implementation. We show how a Component-Based Software Engineering approach can address these constraints. The architecture is implemented using Orca – a component-based software framework for robotic systems. Experimental results from a deployed system comprised of an unmanned air vehicle, a ground vehicle, and two human operators are presented. A section on the lessons learned is included which may be applicable to other distributed systems with complex algorithms. We also compare Orca to the Player software framework in the context of distributed systems.
Resumo:
Micro-businesses, those with fewer than five employees, have a significant impact on the economy. These very small players represent 89% of all Australian businesses and, collectively, they provide 17% of the nation’s private sector employment. They are ubiquitous in Australia as in many other nations, embedded in local communities and therefore well placed to influence community wellbeing. Surprisingly, very little is known about micro-Business Community Responsibility (mBCR), the micro-business equivalent of Small Business Social Responsibility (SBSR) and Corporate Social Responsibility (CSR). Most national data available on business support for community wellbeing does not separately identify micro-business contributions. In this study an exploratory approach informed by business ethics theory was taken. Data from 36 semi-structured interviews was analysed to examine perceived mBCR approaches, motivations and barriers. The sample for this study was a mix of micro-business owner-operators situated in suburban shopping areas in Brisbane. Three types of mBCR emerged. All types are at least partly driven by enlightened selfinterest (ESI). However of the three mBCR types, two combine ESI with other approaches. One type combines ESI and philanthropic approaches to mBCR, and the other combines ESI with social entrepreneurial approaches to mBCR. The combination of doing business and doing good for many micro-business owneroperators, suggests mBCR may be a significant, yet unrecognised component of the third sector social economy.
Resumo:
One of Cultural Studies' most important contributions to academic thinking about culture is the acceptance as axiomatic that we must not simply accept traditional value hierarchies in relation to cultural objects (see, for example, McGuigan, 1992: 157; Brunsdon, 1997: 5; Wark, 2001). Since Richard Hoggart and Raymond Williams took popular culture as a worthy object of study, Cultural Studies practitioners have accepted that the terms in which cultural debate had previously been conducted involved a category error. Opera is not 'better' than pop music, we believe in Cultural Studies - 'better for what?', we would ask. Similarly, Shakespeare is not 'better' than Mills and Boon, unless you can specify the purpose for which you want to use the texts. Shakespeare is indeed better than Mills and Boon for understanding seventeenth century ideas about social organisation; but Mills and Boon is unquestionably better than Shakespeare if you want slightly scandalous, but ultimately reassuring representations of sexual intercourse. The reason that we do not accept traditional hierarchies of cultural value is that we know that the culture that is commonly understood to be 'best' also happens to be that which is preferred by the most educated and most materially well-off people in any given culture (Bourdieu, 1984: 1- 2; Ross, 1989: 211). We can interpret this information in at least two ways. On the one hand, it can be read as proving that the poorer and less well-educated members of a society do indeed have tastes which are innately less worthwhile than those of the material and educational elite. On the other hand, this information can be interpreted as demonstrating that the cultural and material elite publicly represent their own tastes as being the only correct ones. In Cultural Studies, we tend to favour the latter interpretation. We reject the idea that cultural objects have innate value, in terms of beauty, truth, excellence, simply 'there' in the object. That is, we reject 'aesthetic' approaches to culture (Bourdieu, 1984: 6; 485; Hartley, 1994: 6)1. In this, Cultural Studies is similar to other postmodern institutions, where high and popular culture can be mixed in ways unfamiliar to modernist culture (Sim, 1992: 1; Jameson, 1998: 100). So far, so familiar.
Resumo:
Food microstructure represents the way their elements arrangement and their interaction. Researchers in this field benefit from identifying new methods of examination of the microstructure and analysing the images. Experiments were undertaken to study micro-structural changes of food material during drying. Micro-structural images were obtained for potato samples of cubical shape at different moisture contents during drying using scanning electron microscopy. Physical parameters such as cell wall perimeter, and area were calculated using an image identification algorithm, based on edge detection and morphological operators. The algorithm was developed using Matlab.
Resumo:
Background Up to one-third of people affected by cancer experience ongoing psychological distress and would benefit from screening followed by an appropriate level of psychological intervention. This rarely occurs in routine clinical practice due to barriers such as lack of time and experience. This study investigated the feasibility of community-based telephone helpline operators screening callers affected by cancer for their level of distress using a brief screening tool (Distress Thermometer), and triaging to the appropriate level of care using a tiered model. Methods Consecutive cancer patients and carers who contacted the helpline from September-December 2006 (n = 341) were invited to participate. Routine screening and triage was conducted by helpline operators at this time. Additional socio-demographic and psychosocial adjustment data were collected by telephone interview by research staff following the initial call. Results The Distress Thermometer had good overall accuracy in detecting general psychosocial morbidity (Hospital Anxiety and Depression Scale cut-off score ≥ 15) for cancer patients (AUC = 0.73) and carers (AUC = 0.70). We found 73% of participants met the Distress Thermometer cut-off for distress caseness according to the Hospital Anxiety and Depression Scale (a score ≥ 4), and optimal sensitivity (83%, 77%) and specificity (51%, 48%) were obtained with cut-offs of ≥ 4 and ≥ 6 in the patient and carer groups respectively. Distress was significantly associated with the Hospital Anxiety and Depression Scale scores (total, as well as anxiety and depression subscales) and level of care in cancer patients, as well as with the Hospital Anxiety and Depression Scale anxiety subscale for carers. There was a trend for more highly distressed callers to be triaged to more intensive care, with patients with distress scores ≥ 4 more likely to receive extended or specialist care. Conclusions Our data suggest that it was feasible for community-based cancer helpline operators to screen callers for distress using a brief screening tool, the Distress Thermometer, and to triage callers to an appropriate level of care using a tiered model. The Distress Thermometer is a rapid and non-invasive alternative to longer psychometric instruments, and may provide part of the solution in ensuring distressed patients and carers affected by cancer are identified and supported appropriately.
Resumo:
In this paper, a comprehensive planning methodology is proposed that can minimize the line loss, maximize the reliability and improve the voltage profile in a distribution network. The injected active and reactive power of Distributed Generators (DG) and the installed capacitor sizes at different buses and for different load levels are optimally controlled. The tap setting of HV/MV transformer along with the line and transformer upgrading is also included in the objective function. A hybrid optimization method, called Hybrid Discrete Particle Swarm Optimization (HDPSO), is introduced to solve this nonlinear and discrete optimization problem. The proposed HDPSO approach is a developed version of DPSO in which the diversity of the optimizing variables is increased using the genetic algorithm operators to avoid trapping in local minima. The objective function is composed of the investment cost of DGs, capacitors, distribution lines and HV/MV transformer, the line loss, and the reliability. All of these elements are converted into genuine dollars. Given this, a single-objective optimization method is sufficient. The bus voltage and the line current as constraints are satisfied during the optimization procedure. The IEEE 18-bus test system is modified and employed to evaluate the proposed algorithm. The results illustrate the unavoidable need for optimal control on the DG active and reactive power and capacitors in distribution networks.
Resumo:
In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms.