180 resultados para Reputation for Toughness


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is an edited version of an interview recorded for Canadian Theatre Review in 1992. By that time Nowra had established a reputation as one of Australia's foremost playwrights. Part of the generation which succeeded the New Wave of the late 1960s and early 1970s, Nowra became known for a stylistic inventiveness which placed him outside the tradition of realist playwriting in Australia. The international outlook in his early plays, and the fact that he was not exclusively preoccupied with Australian settings and subject matter, was often a focal point in critical accounts of his work. In this interview Nowra discusses his 'internationalism', and a range of topics including the playwriting process; the presence of landscape in his plays; and the autobiographical elements in his work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although Australia is the world’s driest continent without the complication of international borders and a generally good governance reputation, its record of water governance is very poor. This chapter considers some of the potentially general lessons that might be derived for water governance. These include: the difficulties of delineatingwater rights; the apparent preference for creating property rights in unsustainable uses of water while failing to deliver basic water rights; the inter twining of carbon and water crises; the dangers of privatising networks that form natural monopolies; the dangers of disciplinary hubris where interdisciplinary understanding is critical. It concludes by starting to address some of the water governance issues raised by globalisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study is to identify the most common manufacturing practices adopted by the Malaysian manufacturers, company performance factors and relationship between practices and performances. To fulfil the study objectives, 400 manufacturers were surveyed by a standard 400 questionnaire. Three research methodologies such as descriptive analysis, ANOVA and regression analysis have been employed in this study. The analysis revealed that Malaysian manufacturers focus on optimizing three critical performance factors: product development, less customer return rate and on time delivery (OTD). The most important competitive factor was found to be company reputation and design and manufacturing capacity is the least important factor. The findings also proved that manufacturing practices significantly influence company performances

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mechanical damages such as bruising, collision and impact during food processing stages diminish quality and quantity of productions as well as efficiency of operations. Studying mechanical characteristics of food materials will help to enhance current industrial practices. Mechanical properties of fruits and vegetables describe how these materials behave under loading in real industrial operations. Optimizing and designing more efficient equipments require accurate and precise information of tissue behaviours. FE modelling of food industrial processes is an effective method of studying interrelation of variables during mechanical operation. In this study, empirical investigation has been done on mechanical properties of pumpkin peel. The test was a part of FE modelling and simulation of mechanical peeling stage of tough skinned vegetables. The compression test has been conducted on Jap variety of pumpkin. Additionally, stress strain curve, bio-yield and toughness of pumpkin skin have been calculated. The required energy for reaching bio-yield point was 493.75, 507.71 and 451.71 N.mm for 1.25, 10 and 20 mm/min loading speed respectively. Average value of force in bio-yield point for pumpkin peel was 310 N.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Significant empirical data from the fields of management and business strategy suggest that it is a good idea for a company to make in-house the components and processes underpinning a new technology. Other evidence suggests exactly the opposite, saying that firms would be better off buying components and processes from outside suppliers. One possible explanation for this lack of convergence is that earlier research in this area has overlooked two important aspects of the problem: reputation and trust. To gain insight into how these variables may impact make-buy decisions throughout the innovation process, the Sporas algorithm for measuring reputation was added to an existing agent-based model of how firms interact with each other throughout the development of new technologies. The model�s results suggest that reputation and trust do not play a significant role in the long-term fortunes of an individual firm as it contends with technological change in the marketplace. Accordingly, this model serves as a cue for management researchers to investigate more thoroughly the temporal limitations and contingencies that determine how the trust between firms may affect the R&D process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Advice for assisting clients on the law relating to passing off - elements of passing off - overlap with consumer protection and trade mark law - reputation - misrepresentation - damages and remedies

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The corset, with its laces and stays, appears to the modern eyes little more than a stylish torture device. However, the corset enjoyed a reputation among the most fashionable women of the nineteenth century. Since small waists were the primary measure of corporeal beauty, corsets were nearly universal among Western women of the middle class upwards. Wearing a corset was also a marker of decency; only lower classes and women of dubious reputation did not wear corsets. From instrument of torture and symbol of submission to its appropriation by women as a marker of sexual liberation, the corset has gone under a sartorial and symbolic transformation remaining the most erotic element of women’s dress. This paper discusses the corset in two Australian films, Picnic at Hanging Rock (Peter Weir, 1974) and Moulin Rouge (Baz Luhrman, 2001), arguing that the corset provides a counterpoint in each film signifying the tension between beauty and respectability, on the one hand, and desire and transgression, on the other. We argue that the corset is the primary prop around which the narrative revolves as well as the key signifying hook for the audience. The fact that erotic motifs are so rare in Australian films makes the centrality of the corset in these films even more powerful as a discursive trope

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Web 2.0 technology and concepts are being used increasingly by organisations to enhance knowledge, efficiency, engagement and reputation. Understanding the concepts of Web 2.0, its characteristics, and how the technology and concepts can be adopted, is essential to successfully reap the potential benefits. In fact, there is a debate about using the Web 2.0 idiom to refer to the concept behind it; however, this term is widely used in literature as well as in industry. In this paper, the definition of Web 2.0 technology, its characteristics and the attributes, will be presented. In addition, the adoption of such technology is further explored through the presentation of two separate case examples of Web 2.0 being used: to enhance an enterprise; and to enhance university teaching. The similarities between these implementations are identified and discussed, including how the findings point to generic principles of adoption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The chapter approaches resilience from an evolutionary psychology perspective. In recent years scientific studies have revealed many of the biological processes associated with resilient behaviour. The authors argue that the internal constitution and mental toughness of the individual will provide a core protection for life's inevitable tests. A nurtured developing brain 'in-utero' and a physically close dyadic relationship in the early years of life, are crucial to the provision of a resilient personality. Many descriptors of the construct of resilience presented in various studies are explored in this chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collaborative question answering (cQA) portals such as Yahoo! Answers allow users as askers or answer authors to communicate, and exchange information through the asking and answering of questions in the network. In their current set-up, answers to a question are arranged in chronological order. For effective information retrieval, it will be advantageous to have the users’ answers ranked according to their quality. This paper proposes a novel approach of evaluating and ranking the users’answers and recommending the top-n quality answers to information seekers. The proposed approach is based on a user-reputation method which assigns a score to an answer reflecting its answer author’s reputation level in the network. The proposed approach is evaluated on a dataset collected from a live cQA, namely, Yahoo! Answers. To compare the results obtained by the non-content-based user-reputation method, experiments were also conducted with several content-based methods that assign a score to an answer reflecting its content quality. Various combinations of non-content and content-based scores were also used in comparing results. Empirical analysis shows that the proposed method is able to rank the users’ answers and recommend the top-n answers with good accuracy. Results of the proposed method outperform the content-based methods, various combinations, and the results obtained by the popular link analysis method, HITS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Much is known about motivations for giving to charities generally. However, much less has been identified about bequestors as a unique type of charitable donor. This paper explores the motives and barriers for charitable bequest giving. Hypotheses are drawn from the general philanthropic literature and tested using survey data from Australia, a nation distinguished by very high lifetime (inter vivos) giving but low estate (post mortem) giving. The results show that belief in the efficacy of charitable organizations is requisite for leaving a bequest, as the deceased donor has no control over the enactment of the gift. This effect is mediated by the perceived difficulty of making a charitable bequest, which forms an important barrier for leaving such a legacy. Having family whose financial needs are perceived as not taken care of and the perception of financial inability to make a difference also form barriers for bequest giving. The results confirm that bequests constitute a distinctive charitable behaviour, with unique motives and barriers compared to other types of inter vivos giving. While charitable behaviour in general is driven by altruistic attitudes and political and religious values, as well as social reputation, these factors do not affect charitable bequest making as expected. Surprisingly, we find a negative relationship between financial resources and the inclination to leave a charitable bequest. The article ends with suggestions for ways charities might connect more meaningfully with their bequestors or with donors who might consider bequeathing to them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New knowledge has raised a concern about the cost-ineffective design methods and the true performance of railroad prestressed concrete ties. Because of previous knowledge deficiencies, railway civil and track engineers have been aware of the conservative design methods for structural components in any railway track that rely on allowable stresses and material strength reductions. In particular, railway sleeper (or railroad tie) is an important component of railway tracks and is commonly made of prestressed concrete. The existing code for designing such components makes use of the permissible stress design concept, whereas the fiber stresses over cross sections at initial and final stages are limited by some empirical values. It is believed that the concrete ties complying with the permissible stress concept possess unduly untapped fracture toughness, based on a number of proven experiments and field data. Collaborative research run by the Australian Cooperative Research Centre for Railway Engineering and Technologies (Rail CRC) was initiated to ascertain the reserved capacity of Australian railway prestressed concrete ties that were designed using the existing design code. The findings have led to the development of a new limit-states design concept. This paper highlights the conventional and the new limit-states design philosophies and their implication to both the railway community and the public. © 2011 American Society of Civil Engineers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.