792 resultados para Potentially mineralizable N
Resumo:
With increased consolidation and a few large vendors dominating the market, how can software vendors distinguish themselves in order to maintain profitability and gain market share? Increasingly customers are becoming more proactive in selecting a vendor and a product, drawing upon various publications, market surveys, mailing lists, and, of course, other users. In particular, though, a company's Web site is the obvious place to begin information gathering. In sum, it may seem that the days of the uninformed customer prepared to be "sold to" are potentially all but gone.
Resumo:
Our literature review shows that several scholars have conceptualized empowerment in online communities according to context and setting. In general, empowerment by the Internet can be described as the capacity of the Internet to provide information, interactions and collaborations (Amichai-Hamburger, McKenna, & Tal, 2008). Interactions within a social networking site enable people to construct their online identity which potentially empowers them (Zhao, Grasmuck, & Martin, 2008). From a consumer orientation, consumers feel empowered through accessing information which potentially improves their understanding and knowledge in decision making processes (Tina, Kathryn, & Gary, 2006). In health contexts, participation in online communities is seen to empower individuals in coping with health issues (Høybye, Johansen, & Tjørnhøj-Thomsen, 2005; Pitts, 2004; Sharf, 1997; Cornelia F. van Uden-Kraan et al., 2008). In educational contexts, online collaboration processes can empower lecturers and students (Ravid, Kalman, & Rafaeli, 2008). The literature shows that studies of empowerment in online communities are an emerging concept
Resumo:
Opportunity screening is also known as feasibility testing, which is the process of assessing whether a particular business opportunity is within the capacity of either an entrepreneur or an intrapreneur, and also whether it can create sustainable revenues. As the funnel diagram shows, the number of opportunities diminishes as we move to the right through the diagram. This is because not every idea identified in the opportunity identification stage as potentially interesting, and then framed into a business opportunity in the opportunity development stage, will satisfy the formal and informal screening criteria. The informal screening process occurs in all stages of the development process. For example, not every idea that has been identified will be converted into a business opportunity; similarly, not every business opportunity progresses to a feasibility test. Subsequently, only the best business opportunities are screened, and only the very best of those screened then progress to the business plan step.
Resumo:
Purpose: Young adults regularly experience restricted sleep due to a range of social, educational and vocational commitments. Evidence suggests that extended periods of sleep deprivation negatively impact affective and inhibitory control mechanisms leading to behavioural consequences such as increased emotional reactivity and impulsive behaviour. It is less clear whether acute periods of restricted sleep produce the same behavioural consequences. Methods: Nineteen young adults (m = 8, f = 12) with habitual late bed-time (after 22:30 h) and wake-time (after 06:30 h) completed a range of objective and subjective measures assessing sleepiness (Psychomotor Vigilance Task, Karolinska Sleepiness Scale), inhibitory control (Emotional Go/No-go Task and a Balloon Analog Risk Task) and affect (Positive and Negative Affective Schedule). Testing was counterbalanced across participants, and occurred on two occasions once following restricted sleep and once following habitual sleep one week apart. Results: Compared to habitual sleep, sleep restriction produced significantly slower performance on the Psychomotor Vigilance Task, and higher subjective ratings of sleepiness on the Karolinska Sleepiness Scale. Sleep restriction also caused a significant decrease in positive affect, but no change in negative affect on the Affective Schedule. Inhibitory control efficiency was significantly differentiated, with participants showing an increase in risk taking on the Balloon Analog Risk Task, but there was no evidence of increased reactivity to negative stimuli on the Emotional Go/No-go task. Conclusions: Results suggest that even acute periods of sleep loss may cause deficits in affective experiences and increase impulsive and potentially high risk behaviour in young adults.
Resumo:
In its simplest form the patent system is designed to encourage the disclosure of innovative thought in exchange for a period of exclusivity in which the grantee of the rights may profit from such knowledge. I will attempt in this paper to show that patentees seeking to enforce their patents in Australia will face great difficulty through a number of potentially fatal pitfalls. I also submit that as a result of the decisions in Australia in reported patent cases in the last ten years, legal advisers should place their clients on notice that if they are trying to enforce their patents they are unlikely to succeed...
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
Aim The assessment of treatment plans is an important component in the education of radiation therapists. The establishment of a grade for a plan is currently based on subjective assessment of a range of criteria. The automation of assessment could provide a number of advantages including faster feedback, reduced chance of human error, and simpler aggregation of past results. Method A collection of treatments planned by a cohort of 27 second year radiation therapy students were selected for quantitative evaluation. Treatment sites included the bladder, cervix, larynx, parotid and prostate, although only the larynx plans had been assessed in detail. The plans were designed with the Pinnacle system and exported using the DICOM framework. Assessment criteria included beam arrangement optimisation, volume contouring, target dose coverage and homogeneity, and organ-at-risk sparing. The in-house Treatment and Dose Assessor (TADA) software1 was evaluated for suitability in assisting with the quantitative assessment of these plans. Dose volume data were exported in per-student and per-structure data tables, along with beam complexity metrics, dose volume histograms, and reports on naming conventions. Results The treatment plans were exported and processed using TADA, with the processing of all 27 plans for each treatment site taking less than two minutes. Naming conventions were successfully checked against a reference protocol. Significant variations between student plans were found. Correlation with assessment feedback was established for the larynx plans. Conclusion The data generated could be used to inform the selection of future assessment criteria, monitor student development, and provide useful feedback to the students. The provision of objective, quantitative evaluations of plan quality would be a valuable addition to not only radiotherapy education programmes but also for staff development and potentially credentialing methods. New functionality within TADA developed for this work could be applied clinically to, for example, evaluate protocol compliance.
Resumo:
The interest in potentially economically valuable plants (for food, timber, dyes, fabric, and drugs) was part of the concerted effort given by colonial governments towards providing botanic gardens in new colonies. While convicts and guards laboured in Brisbane Town from 1825 until 1849, botanists such as Alan Cunningham were discovering the delights of native plants in their numerous excursions. Their observations and collections of seeds were sent south (to the local botanic gardens at Melbourne and Sydney) and onward to the Royal Botanic Gardens in Britain (at Kew and Edinburgh). This set the local pattern for future exchanges among the global British Imperial botanic garden network...
Resumo:
More than ten years has passed since the High Court of Australia confirmed the recoverability of damages for the cost of raising a child in the well know decision of Cattanach v Melchior . A recent decision of the Supreme Court of New South Wales was widely anticipated as potentially providing a comprehensive discussion of the principles relevant to the assessment of damages in wrongful birth cases.
Resumo:
Surgical site infections following caesarean section are a serious and costly adverse event for Australian hospitals. In the United Kingdom, 9% of women are diagnosed with a surgical site infection following caesarean section either in hospital or post-discharge (Wloch et al 2012, Ward et al 2008). Additional staff time, pharmaceuticals and health supplies, and increased length of stay or readmission to hospital are often required (Henman et al 2012). Part of my PhD investigated the economics of preventing post-caesarean infection. This paper summarises a review of relevant infection prevention strategies. Administering antibiotic prophylaxis 15 to 60 minutes pre-incision, rather than post cordclamping, is probably the most important infection prevention strategy for caesarean section (Smaill and Gyte2010, Liu et al 2013, Dahlke et al 2013). However the timing of antibiotic administration is reportedly inconsistent in Australian hospitals. Clinicians may be taking advice from the influential, but out-dated RANZCOG and United States Centers for Disease Control and Prevention guidelines (Royal Australian and New Zealand College of Obstetricians and Gynaecologists 2011, Mangram et al 1999). A number of other important international clinical guidelines, including Australia's NHMRC guidelines, recommend universal prophylactic antibiotics pre-incision for caesarean section (National Health and Medical Research Council 2010, National Collaborating Centre for Women's and Children's Health 2008, Anderson et al 2008, National Collaborating Centre for Women's and Children's Health 2011, Bratzler et al 2013, American College of Obstetricians and Gynecologists 2011a, Antibiotic Expert Group 2010). We need to ensure women receive preincision antibiotic prophylaxis, particularly as nurses and midwives play a significant role in managing an infection that may result from sub-optimal practice. It is acknowledged more explicitly now that nurses and midwives can influence prescribing and administration of antibiotics through informal approaches (Edwards et al 2011). Methods such as surgical safety checklists are a more formal way for nurses and midwives to ensure that antibiotics are administered pre-incision (American College of Obstetricians and Gynecologists 2011 b). Nurses and midwives can also be directly responsible for other infection prevention strategies such as instructing women to not remove pubic hair in the month before the expected date of delivery and wound management education (Ng et al 2013). Potentially more costly but effective strategies include using a Chlorhexidine-gluconate (CHG) sponge preoperatively (in addition to the usual operating room skin preparation) and vaginal cleansing with a povidone-iodine solution (Riley et al 2012, Rauk 2010, Haas, Morgan, and Contreras 2013).
Resumo:
Contralateral bones are often used in many medical applications but it is assumed that their bilateral differences are insignificant. Previous studies used a limited number of distance measurements in quantifying the corresponding differences; therefore, little is known about their bilateral 3D surface asymmetries. The aim of the study is to develop a comprehensive method to quantify geometrical asymmetries between the left and right tibia in order to provide first results on whether the contralateral tibia can be used as an equivalent reference. In this study, 3D bone models were reconstructed from CT scans of seven tibiae pairs, and 34 variables consisting of 2D and 3D measurements were measured from various anatomical regions. All 2D measurements, and lateral plateau and distal subchondral bone surface measurements showed insignificant differences (p > 0.05), but the rest of the surfaces showed significant differences (p < 0.05). Our results suggest that the contralateral tibia can be used as a reference especially in surgical applications such as articular reconstructions since the bilateral differences in the subchondral bone surfaces were less than 0.3 mm. The method can also be potentially transferable to other relevant studies that require the accurate quantification of bone bilateral asymmetries.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
Understanding dynamics of interactions between community groups and government agencies is crucial to improve community resilience for flood risk reduction through effective community engagement strategies. Overall, a variety of approaches are available, however they are limited in their application. Based on research of a case study in Kampung Melayu Village in Jakarta, further complexity in engaging community emerges in planning policy which requires the relocation of households living in floodplains. This complexity arises in decision-making processes due to barriers to communication. This obstacle highlights the need for a simplified approach for an effective flood risk management which will be further explored in this paper. Qualitative analyses will be undertaken following semi-structured interviews conducted with key actors within government agencies, non-governmental organisations (NGOs), and representatives of communities. The analyses involve investigation of barriers and constraints on community engagement in flood risk management, particularly relevant to collaboration mechanism, perception of risk, and technical literacy to flood risk. These analyses result in potential redirection of community consultation strategies to lead to a more effective collaboration among stakeholders in the decision-making processes. As a result, greater effectiveness in plan implementation of flood risk management potentially improves disaster resilience in the future.
Resumo:
The Children’s Book Council of Australia (CBCA) administers the oldest national prize for children’s literature in Australia. Each year, the CBCA confers “Book of the Year” awards to literature for young people in five categories. In 2001, the establishment of an “Early Childhood” category opened up the venerable “Picture Book” category (first awarded in 1955) to books with an implied readership up to 18 years of age. As a result, this category has emerged in recent years as a highly visible space within which the CBCA can contest discourses of cultural marginalisation insofar as Australian (“colonial”) literature is constructed as inferior or adjunct to the major Anglophone literary traditions, and the consistent identification of children’s literature (and, indeed, of children) as lesser than its ‘adult’ counterparts. The CBCA is engaged in defining, evaluating, and legitimising a tradition of Australian children’s literature which is underpinned by a canonical impulse, and is a reflexive practice of self-definition, self-evaluation and self-legitimisation for the CBCA itself. While it is obviously problematic to identify award winners as a canon, it is equally obvious that literary prizing is a cultural practice derived from the logic of canonicity. In his discussion of the United States’s Newbery Medal, Kenneth Kidd notes that “Medal books are instant classics, the selection process an ostensible simulation of the test of time” (169) and that “the Medal is part of the canonical architecture of children's literature” (169). Thus, it is instructive to consider the visions and values of the national, of the social, and of the literary-aesthetic, in the picture books chosen by the Children’s Book Council of Australia (CBCA) as the “best” of the early twenty-first century. These books not only constitute a kind of canon for contemporary Australian children’s literature, but may well come to define what contemporary Australian children’s literature means in the wider literary field. The Book of the Year: Picture Book awards given by the CBCA since 2001 demonstrate that it is not only true of the Booker Prize that, “The choices of winning books reflect not only on the books themselves, then, but also back on the Prize, affecting its reputation and creating journalistic capital which is vital for the Prize to achieve its prominence and impact.” (81). Many of the twenty-first century CBCA award-winning picture books complicate traditional or comfortable understanding of Australianness, children’s literature, or “appropriate” modes of form and content, reminding us that “moments when texts resist or complicate recuperation into national discourses offer fruitful points for exploring the relationships between text and celebratory context” (Roberts 6). The CBCA has taken the opportunities offered by the liberation of the Picture Book category from an implied readership to challenge dominant constructions of children’s literature in Australia, and in so doing, are engaged in overt practices of canonicity with potentially long-lasting effects. Works Cited: Kidd, Kenneth. “Prizing Children’s Literature: The Case of Newbery Gold.” Children's Literature 35 (2007): 166-190. Roberts, Gillian. Prizing Literature: The Celebration and Circulation of National Culture. Toronto: U Toronto P, 2011. Squires, Claire. “Book Marketing and the Booker Prize.” Judging a Book by Its Cover: Fans, Publishers, Designers, and the Marketing of Fiction. Eds. Nicole Matthews and Nickianne Moody. Aldershot: Ashgate, 2007. 71-82.
Resumo:
Purpose: The paper aims to investigate urban knowledge precincts from the angle of urban planning and place branding. Scope: The paper focuses on urban knowledge precinct development experiences of Brisbane, Australia. Method: The paper uses literature review, policy and content analyses and field observation methods to explore Brisbane’s urban knowledge precincts. Results: The paper reveals insights from Brisbane’s urban knowledge precincts development journey. Recommendations: The paper suggests further research on the topic of branding and planning urban knowledge precincts. Conclusions: The paper reveals that urban knowledge precincts are the nexus of knowledge-based urban development and Brisbane’s precincts potentially provide a competitive edge to the city in the global knowledge economy era.