270 resultados para 319-C0010A
Resumo:
In Hobbs Haulage Pty Ltd v Zupps Southside Pty Ltd [2013] QSC 319 Jackson J considered the application of the concurrent liability provisions of the Civil Liability Act 2003 (Qld).
Resumo:
We present a pole inspection system for outdoor environments comprising a high-speed camera on a vertical take-off and landing (VTOL) aerial platform. The pole inspection task requires a vehicle to fly close to a structure while maintaining a fixed stand-off distance from it. Typical GPS errors make GPS-based navigation unsuitable for this task however. When flying outdoors a vehicle is also affected by aerodynamics disturbances such as wind gusts, so the onboard controller must be robust to these disturbances in order to maintain the stand-off distance. Two problems must therefor be addressed: fast and accurate state estimation without GPS, and the design of a robust controller. We resolve these problems by a) performing visual + inertial relative state estimation and b) using a robust line tracker and a nested controller design. Our state estimation exploits high-speed camera images (100Hz) and 70Hz IMU data fused in an Extended Kalman Filter (EKF). We demonstrate results from outdoor experiments for pole-relative hovering, and pole circumnavigation where the operator provides only yaw commands. Lastly, we show results for image-based 3D reconstruction and texture mapping of a pole to demonstrate the usefulness for inspection tasks.
Resumo:
In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to apply the distinguishing and key-recovery attacks. To build the distinguisher, all possible differences are traced through the cipher and the truncated differential probability distribution is determined for every output nibble. We concatenate additional rounds to the beginning and end of the truncated differential distribution to apply the key-recovery attack. By exploiting properties of the key schedule, we obtain a large overlap of key bits used in the beginning and final rounds. This allows us to significantly increase the differential probabilities and hence reduce the attack complexity. We validate the analysis by implementing the attack on LBlock reduced to 12 rounds. Finally, we apply single-key and related-key attacks on 18 and 21-round LBlock, respectively.
Resumo:
Software development settings provide a great opportunity for CSCW researchers to study collaborative work. In this paper, we explore a specific work practice called bug reproduction that is a part of the software bug-fixing process. Bug re-production is a highly collaborative process by which software developers attempt to locally replicate the ‘environment’ within which a bug was originally encountered. Customers, who encounter bugs in their everyday use of systems, play an important role in bug reproduction as they provide useful information to developers, in the form of steps for reproduction, software screenshots, trace logs, and other ways to describe a problem. Bug reproduction, however, poses major hurdles in software maintenance as it is often challenging to replicate the contextual aspects that are at play at the customers’ end. To study the bug reproduction process from a human-centered perspective, we carried out an ethnographic study at a multinational engineering company. Using semi-structured interviews, a questionnaire and half-a-day observation of sixteen software developers working on different software maintenance projects, we studied bug reproduction. In this pa-per, we present a holistic view of bug reproduction practices from a real-world set-ting and discuss implications for designing tools to address the challenges developers face during bug reproduction.
Resumo:
Background. Volitional risky driving behaviours such as drink- and drug-driving (i.e. substance-impaired driving) and speeding contribute to the overrepresentation of young novice drivers in road crash fatalities, and crash risk is greatest during the first year of independent driving in particular. Aims. To explore the: 1) self-reported compliance of drivers with road rules regarding substance-impaired driving and other risky driving behaviours (e.g., speeding, driving while tired), one year after progression from a Learner to a Provisional (intermediate) licence; and 2) interrelationships between substance-impaired driving and other risky driving behaviours (e.g., crashes, offences, and Police avoidance). Methods. Drivers (n = 1,076; 319 males) aged 18-20 years were surveyed regarding their sociodemographics (age, gender) and self-reported driving behaviours including crashes, offences, Police avoidance, and driving intentions. Results. A relatively small proportion of participants reported driving after taking drugs (6.3% of males, 1.3% of females) and drinking alcohol (18.5% of males, 11.8% of females). In comparison, a considerable proportion of participants reported at least occasionally exceeding speed limits (86.7% of novices), and risky behaviours like driving when tired (83.6% of novices). Substance-impaired driving was associated with avoiding Police, speeding, risky driving intentions, and self-reported crashes and offences. Forty-three percent of respondents who drove after taking drugs also reported alcohol-impaired driving. Discussion and Conclusions. Behaviours of concern include drink driving, speeding, novice driving errors such as misjudging the speed of oncoming vehicles, violations of graduated driver licensing passenger restrictions, driving tired, driving faster if in a bad mood, and active punishment avoidance. Given the interrelationships between the risky driving behaviours, a deeper understanding of influential factors is required to inform targeted and general countermeasure implementation and evaluation during this critical driving period. Notwithstanding this, a combination of enforcement, education, and engineering efforts appear necessary to improve the road safety of the young novice driver, and for the drink-driving young novice driver in particular.
Resumo:
Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.
Resumo:
In creative disciplines, reflective practice is an integral and cumulative form of learning. Reflective learning generates knowledge that is specific to oneself and is a form of evidence upon which to analyse and change one’s practice. Critical reflection requires a deep knowledge of the discipline and an awareness of one’s positioning within that discipline and in relation to one’s creative performance. Meaning making through performative expression allows for personal transformation through acute awareness of and reflection on one’s own beliefs, knowledges and values through the process of creating artistic work. Self-awareness and identity are significant both in the study of the arts and in becoming an artist, as aesthetic inquiry and performance are constituted by subjective self-expression in relation to objective conditions. Reflection can be expressed using symbols or semiotic systems other than language. Depending on the disciplinary context, particular modes or forms of expression will be privileged, including material forms of practice, still and moving images, music and sound, live action and digital code. This chapter explores the problematics of what counts as reflection in the arts and how reflection is represented, expressed and performed in discursive and non-discursive ways in becoming arts literate.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
First Asia Pacific Conference, AP-BPM 2013, Beijing, China, August 29-30, 2013. Selected Papers
Resumo:
OBJECTIVE To assess the concurrent validity of fasting indexes of insulin sensitivity and secretion in - obese prepubertal (Tanner stage 1) children and pubertal (Tanner stages 2-5) glucose tolerance test (FSIVGTT) as a criterion measure. RESEARCH DESIGN AND METHODS Eighteen obese children and adolescents (11 girls and 7 boys, mean age 12.2 +/- 2.4 years, mean BMI 35.4 +/- 6.2 kg/m(2), mean BMI-SDS 3.5 +/- 0.5, 7 prepubertal and I I pubertal) participated in the study. All participants underwent an insulin-modified FSIVGTT on two occasions, and 15 repeated this test a third time (mean 12.9 and 12.0 weeks apart). S-i measured by the FSIVGTT was compared with homeostasis model assessment (HOMA) of insulin resistance (HOMA-IR), quantitative insulin-sensitivity check index (QUICKI), fasting glucose-to-insulin ratio (FGIR), and fasting insulin (estimates of insulin sensitivity derived from fasting samples). The acute insulin response (AIR) measured by the FSIVGTT was compared with HOMA of percent beta-cell function (HOMA-beta%), FGIR, and fasting insulin (estimates of insulin secretion derived from fasting samples). RESULTS There was a significant negative correlation between HOMA-IR and S-i (r = -0.89, r = -0.90, and r = -0.81, P < 0.01) and a significant positive correlation between QUICKI and S-i (r = 0.89, r = 0.90, and r = 0.81, P < 0.01) at each time point. There was a significant positive correlation between FGIR and S-i (r = 0.91, r = 0.91, and r = 0.82, P < 0.01) and a significant negative correlation between fasting insulin and S-i (r = -90, r = -0.90, and r = -0.88, P < 0.01). HOMA-beta% was not as strongly correlated with AIR (r = 0.60, r = 0.54, and r = 0.61, P < 0.05). CONCLUSIONS HOMA-IR, QUICKI, FGIR, and fasting insulin correlate strongly with S-i assessed by the FSIVGTT in obese children and adolescents. Correlations between HOMA-β% FGIR and fasting insulin, and AIR were not as strong. Indexes derived from fasting samples are a valid tool for assessing insulin sensitivity in prepubertal and pubertal obese children.
Resumo:
The structures of the ammonium salts of 3,5-dinitrobenzoic acid, NH4+ C7H3N2O6- (I), 4-nitrobenzoic acid, NH4+ C7H4N2O4- . 2H2O (II) and 2,4-dichlorobenzoic acid, NH4+ C7H3Cl2O2- . 0.5H2O (III), have been determined and their hydrogen-bonded structures are described. All salts form hydrogen-bonded polymeric structures, three-dimensional in (I) and two-dimensional in (II) and (III). With (I), a primary cation-anion cyclic association is formed [graph set R3/4(10)] through N-H...O hydrogen bonds, involving a carboxyl O,O' group on one side and a single carboxyl O-atom on the other. Structure extension involves both N-H...O hydrogen bonds to both carboxyl and nitro O-atom acceptors. With structure (II), the primary inter-species interactions and structure extension into layers lying parallel to (0 0 1) are through conjoined cyclic hydrogen-bonding motifs: R3/4(10) [one cation, a carboxyl (O,O') group and two water molecules] and centrosymmetric R2/4(8) [two cations and two water molecules]. The structure of (III) also has conjoined R3/4(10) and centrosymmetric R2/4(8) motifs in the layered structure but these differ in that he first involves one cation, a carboxyl (O,O') as well as a carboxyl (O) group and one water molecule, the second, two cations and two carboxyl O-groups. The layers lie parallel to (1 0 0). The structures of the salt hydrates (II) and (III) reported in this work, giving two-dimensional layered arrays through conjoined hydrogen-bonded nets provide further illustrations of a previously indicated trend among ammonium salts of carboxylic acids, but the anhydrous three-dimensional structure of (I) is inconsistent.
Resumo:
With the growing size and variety of social media files on the web, it’s becoming critical to efficiently organize them into clusters for further processing. This paper presents a novel scalable constrained document clustering method that harnesses the power of search engines capable of dealing with large text data. Instead of calculating distance between the documents and all of the clusters’ centroids, a neighborhood of best cluster candidates is chosen using a document ranking scheme. To make the method faster and less memory dependable, the in-memory and in-database processing are combined in a semi-incremental manner. This method has been extensively tested in the social event detection application. Empirical analysis shows that the proposed method is efficient both in computation and memory usage while producing notable accuracy.
Resumo:
The effects of crack depth (a/W) and specimen width W on the fracture toughness and ductile±brittle transition have been investigated using three-point bend specimens. Finite element analysis is employed to obtain the stress-strain fields ahead of the crack tip. The results show that both normalized crack depth (a/W) and specimen width (W) affect the fracture toughness and ductile±brittle fracture transition. The measured crack tip opening displacement decreases and ductile±brittle transition occurs with increasing crack depth (a/W) from 0.1 to 0.2 and 0.3. At a fixed a/W (0.2 or 0.3), all specimens fail by cleavage prior to ductile tearing when specimen width W increases from 25 to 40 and 50 mm. The lower bound fracture toughness is not sensitive to crack depth and specimen width. Finite element analysis shows that the opening stress in the remaining ligament is elevated with increasing crack depth or specimen width due to the increase of in-plane constraint. The average local cleavage stress is dependent on both crack depth and specimen width but its lower bound value is not sensitive to constraint level. No fixed distance can be found from the cleavage initiation site to the crack tip and this distance increases gradually with decreasing inplane constraint.
Resumo:
Over the last three decades, a growing body of research related to epistemic beliefs has been identified as a crucial for understanding teaching and learning (Yadav, Herron, & Samarapungavan, 2011). In particular, research related to beliefs about teaching, learning and knowledge has been considered important for understanding why teachers engage in certain approaches to pedagogy, curriculum and assessment in classrooms (Stromlo & Bråten, 2011). The beliefs held by teachers about knowledge and knowing, otherwise known as personal epistemology (Hofer, 2010), have been shown to influence other knowledge and beliefs (Schommer-Aikens, 2004). Five and Buehl (2012) indicated that because an individual’s understanding of reality is always seen through the lens of existing beliefs, the role of beliefs as a filter is particularly relevant in the context of teacher education. That is, if beliefs influence how individuals interpret new information and experiences, preservice and practicing teachers’ beliefs shape what and how they learn about teaching.” (p. 470-480). It is likely that such beliefs have an important relationship with teacher knowledge and practices...
Resumo:
Mothers represent a large segment of marketing dollars and traditionally, word of mouth was spread from mother to mother in a face-to-face environment, such as the school car park or mother’s groups. As families have evolved, so too has the traditional mother’s group. Limited academic studies have explored online mothers’ groups and how they impact on consumption. In order to explore the nature of this online influence and how mothers are influenced by other mothers online, a study was conducted through the use of observation and qualitative questioning. The data suggests that trust between mothers is generally high and mothers tend to trust the opinions of other mothers when they recommend a product. This is similar in other reference group contexts, however, mothers are communicating about brands frequently and influencing behaviour. This leads to a number of managerial and theoretical implications discussed in the paper.