275 resultados para Georgia-Pacific Big Lagoon Tree Farm, Humboldt County, California


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a general, global approach to the problem of robot exploration, utilizing a topological data structure to guide an underlying Simultaneous Localization and Mapping (SLAM) process. A Gap Navigation Tree (GNT) is used to motivate global target selection and occluded regions of the environment (called “gaps”) are tracked probabilistically. The process of map construction and the motion of the vehicle alters both the shape and location of these regions. The use of online mapping is shown to reduce the difficulties in implementing the GNT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the decade since the destination branding literature emerged (see for example Pritchard & Morgan 1998, Dosen & Vransevic 1998), only a few books have been published. These are Morgan et al.’s (2002, 2004) edited volumes of international case studies and conceptual papers, and Baker’s (2007) practitioner perspective on branding small cities in the USA. This work by Stephanie Donald and John Gammack is the first research-based text related to destination branding, and is a welcome and timely addition to the field. In the foreword to the first issue of Place Branding and Public Policy, editor Simon Anholt (2004, p. 4) suggested “almost nobody agrees on what, exactly, branding means”, when he described place branding practice as akin to the Wild West. Indeed, this lack of theory was one of the motivators for the authors of this text. Tourism and the Branded City is part of Ashgate’s New Directions in Tourism Analysis series, edited by Dimitri Ioannides. The aim of the series is to address the gap in published theory underpinning the study of tourism, with a particular interest in non-business disciplines such as Sociology, Social Anthropology, Human and Social Geography, and Cultural Studies...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

China has experienced an extraordinary level of economic development since the 1990s, following excessive competition between different regions. This has resulted in many resource and environmental problems. Land resources, for example, are either abused or wasted in many regions. The strategy of development priority zoning (DPZ), proposed by the Chinese National 11th Five-Year Plan, provides an opportunity to solve these problems by coordinating regional development and protection. In line with the rational utilization of land, it is proposed that the DPZ strategy should be integrated with regional land use policy. As there has been little research to date on this issue, this paper introduces a system dynamic (SD) model for assessing land use change in China led by the DPZ strategy. Land use is characterized by the prioritization of land development, land utilization, land harness and land protection (D-U-H-P). By using the Delphi method, a corresponding suitable prioritization of D-U-H-P for the four types of DPZ, including optimized development zones (ODZ), key development zones (KDZ), restricted development zones (RDZ), and forbidden development zones (FDZ) are identified. Suichang County is used as a case study in which to conduct the simulation of land use change under the RDZ strategy. The findings enable a conceptualization to be made of DPZ-led land use change and the identification of further implications for land use planning generally. The SD model also provides a potential tool for local government to combine DPZ strategy at the national level with land use planning at the local level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information Technology (IT) is an important resource that facilitates growth and development in both the developed and emerging economies. The increasing forces of globalization are creating a wider digital divide between the developed and emerging economies. The smaller emerging economies are the most venerable. Intense competition for IT resources means that these emerging economies would need to acquire a deeper understanding of how to source and evaluate their IT-related efforts. This effort would put these economies in a better position to source funding from various stakeholders. This research presents a complementary approach to securing better IT-related business value in organizations in the South Pacific Island countries – a case of emerging economies. Analysis of data collected from six South Pacific Island countries suggests that organizations that invest in IT and related complementaries are able to better their business processes. The data also suggest that improved business processes lead to overall business processes improvements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A wireless sensor network collected real-time water-quality measurements to investigate how current irrigation practices—in particular, underground water salination—affect the environment. New protocols provided high end-to-end packet delivery rates in the hostile deployment environment.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on the turning point experiences that worked to transform the researcher during a preliminary consultation process to seek permission to conduct of a small pilot project on one Torres Strait Island. The project aimed to learn from parents how they support their children in their mathematics learning. Drawing on a community research design, a consultative meeting was held with one Torres Strait Islander community to discuss the possibility of piloting a small project that focused on working with parents and children to learn about early mathematics processes. Preliminary data indicated that parents use networks in their community. It highlighted the funds of knowledge of mathematics that exist in the community and which are used to teach their children. Such knowledges are situated within a community’s unique histories, culture and the voices of the people. “Omei” tree means the Tree of Wisdom in the Island community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Patients with chest pain contribute substantially to emergency department attendances, lengthy hospital stay, and inpatient admissions. A reliable, reproducible, and fast process to identify patients presenting with chest pain who have a low short-term risk of a major adverse cardiac event is needed to facilitate early discharge. We aimed to prospectively validate the safety of a predefined 2-h accelerated diagnostic protocol (ADP) to assess patients presenting to the emergency department with chest pain symptoms suggestive of acute coronary syndrome. Methods: This observational study was undertaken in 14 emergency departments in nine countries in the Asia-Pacific region, in patients aged 18 years and older with at least 5 min of chest pain. The ADP included use of a structured pre-test probability scoring method (Thrombolysis in Myocardial Infarction [TIMI] score), electrocardiograph, and point-of-care biomarker panel of troponin, creatine kinase MB, and myoglobin. The primary endpoint was major adverse cardiac events within 30 days after initial presentation (including initial hospital attendance). This trial is registered with the Australia-New Zealand Clinical Trials Registry, number ACTRN12609000283279. Findings: 3582 consecutive patients were recruited and completed 30-day follow-up. 421 (11•8%) patients had a major adverse cardiac event. The ADP classified 352 (9•8%) patients as low risk and potentially suitable for early discharge. A major adverse cardiac event occurred in three (0•9%) of these patients, giving the ADP a sensitivity of 99•3% (95% CI 97•9–99•8), a negative predictive value of 99•1% (97•3–99•8), and a specificity of 11•0% (10•0–12•2). Interpretation: This novel ADP identifies patients at very low risk of a short-term major adverse cardiac event who might be suitable for early discharge. Such an approach could be used to decrease the overall observation periods and admissions for chest pain. The components needed for the implementation of this strategy are widely available. The ADP has the potential to affect health-service delivery worldwide.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The factors affecting driving behaviors are various and interact simultaneously. Therefore, study of their correlations affecting on driving behaviors is of interest. This paper reports a questionnaire survey in China, focusing on the effect of Big-Five factors on speeding, drink driving, and distracted driving while Akers' social learning theory and Homel's deterrence theory were applied. The results showed that personalities had significant effect on speeding and drink driving; social factors had significant effect on speeding and distracted driving; deterrence had significant effect on speeding and drink driving; however, social learning theory did not contribute to drink driving; deterrence did not affect distracted driving. The results were discussed along with the limitation of this study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human personality is an important component of psychological factors affecting pedestrian crossing. This paper reports a questionnaire survey on the effects of pedestrian personalities (including neuroticism, extraversion, openness, agreeableness and conscientiousness) on pedestrian violation in China. 675 feedbacks were obtained, of which 535 samples were valid for analysis. The results of the hierarchical regression analysis showed that educational level had significant effect on violation; agreeableness had significant effect on violation, conditional compliance and unconditional compliance; consciousness had significant effect on violation and conditional compliance; extraversion had significant effect on unconditional compliance; neuroticism had significant effect on violation; educational level had significant effect on violation. The results implied that psychological measures played a very important role in pedestrian safety.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.