482 resultados para One-point Quadrature
Resumo:
This research aims to increase understanding of and delivery to qualitative (or intangible) outcomes and impacts of major economic infrastructure projects (i.e. bridges, roads, water infrastructure and the like), and the role of stakeholder engagement in this process.-------- Recent doctoral research completed at the Queensland University of Technology by the author investigated how the principles of corporate responsibility are applied in the construction sector. This related specifically to major economic infrastructure projects (hereafter referred to as major projects), with particular regard to urban transportation projects. One outcome of this past research was a value-mapping framework which enables organisations to track project outcomes to pre-existing corporate objectives, and report on these throughout the project life-cycle. Two recommendations for future research from that work formed the basis for this current research: • How can qualitative measurables be better integrated into decision-making on major economic infrastructure projects? • How can non-contractual stakeholders be more effectively engaged with on these projects? The link between these two areas may relate to the stakeholders’ role in qualitative indicator identification and measurement. This is a key point for future investigation.---------- The aim of this research is thus to further investigate these two areas, with the intent of (i) better defining the research direction; (ii) identifying potential research partners; and (iii) identify possible sources of future funding.
Resumo:
Poet's statement: My father died of pancreatic cancer a few years ago, and since then other family members and friends have developed cancer. Some have recovered, perhaps temporarily, while for others the prospect is one of inevitable decline, raising questions about when the point is reached where death is preferable to life. This poem expresses the ambiguity of visceral urges which could be towards either continued life or a relieving death.
Resumo:
In this paper, the optimal allocation and sizing of distributed generators (DGs) in a distribution system is studied. To achieve this goal, an optimization problem should be solved in which the main objective is to minimize the DGs cost and to maximise the reliability simultaneously. The active power balance between loads and DGs during the isolation time is used as a constraint. Another point considered in this process is the load shedding. It means that if the summation of DGs active power in a zone, isolated by the sectionalizers because of a fault, is less than the total active power of loads located in that zone, the program start shedding the loads in one-by-one using the priority rule still the active power balance is satisfied. This assumption decreases the reliability index, SAIDI, compared with the case loads in a zone are shed when total DGs power is less than the total load power. To validate the proposed method, a 17-bus distribution system is employed and the results are analysed.
Resumo:
The doctrine of 'prosecution history estoppel' (PH estoppel) as developed in the United States has strong intuitive appeal, especially when applied to counterbalance a related patent law principle, the doctrine of equivalents. The doctrines are receiving increasing attention in US patent decisions, to the point where one patent litigator recently compared them to "two cars that keep bumping fenders. They are frequently returned to the shop for repairs". Could PH estoppel find its way into UK patent law? This article briefly examines the doctrine, its evolution in the US and the problems associated with importing the doctrine into the UK. As the EU legislation stands, Article 69 and the Protocol to the European Patent Convention (EPC) pose serious obstacles to using the doctrine directly in claim construction. However there appears to be some scope to apply the doctrine as a limited form of defence in infringement actions.
Resumo:
We review and discuss the literature on small firm growth with an intention to provide a useful vantage point for new research studies regarding this important phenomenon. We first discuss conceptual and methodological issues that represent critical choices for those who research growth and which make it challenging to compare results from previous studies. The substantial review of past research is organized into four sections representing two smaller and two larger literatures. The first of the latter focuses on internal and external drivers of small firm growth. Here we find that much has been learnt and that many valuable generalizations can be made. However, we also conclude that more research of the same kind is unlikely to yield much. While interactive and non-linear effects may be worth pursuing it is unlikely that any new and important growth drivers or strong, linear main effects would be found. The second large literature deals with organizational life-cycles or stages of development. While deservedly criticized for unwarranted determinism and weak empirics this type of approach addresses problems of high practical and also theoretical relevance, and should not be shunned by researchers. We argue that with a change in the fundamental assumptions and improved empirical design, research on the organizational and managerial consequences of growth is an important line of inquiry. With this, we overlap with one of the smaller literatures, namely studies focusing on the effects of growth. We argue that studies too often assume that growth equals success. We advocate instead the use of growth as an intermediary variable that influences more fundamental goals in ways that should be carefully examined rather than assumed. The second small literature distinguishes between different modes or forms of growth, including, e.g., organic vs. acquisition-based growth, and international expansion. We note that modes of growth is an important topic that has been under studied in the growth literature, whereas in other branches of research aspects of it may have been studied intensely, but not primarily from a growth perspective. In the final section we elaborate on ways forward for research on small firm growth. We point at rich opportunities for researchers who look beyond drivers of growth, where growth is viewed as a homogenous phenomenon assumed to unambiguously reflect success, and instead focus on growth as a process and a multi-dimensional phenomenon, as well as on how growth relates to more fundamental outcomes.
Resumo:
The concept of the indigenous person or group in Africa is a contentious one. The current argument is that there exist no indigenous people in Africa because all Africans are indigenous. The obverse considers those Africans who have not been touched by colonialism and lost their traditional cultures commensurate with attachments to the lands or a distinguishable traditional lifestyle to be indigenous. This paper argues in favor of the latter. People who live in the global telos and do not participate in a distinct traditional culture that has been attached to the land for centuries are not indigenous. It is argued that this cultural divergence between modern and traditional is the major identifying point to settle the indigenous-non indigenous African debate. Finally, the paper looks at inclusive development and provides a new political analysis model for quantifying inclusivity so as to measure the inclusivity of indigenous peoples.
Resumo:
The care of the mechanically ventilated patient is at the core of a nurse's clinical practice in the Intensive Care Unit (ICU). Published work relating to the numerous nursing issues of the care of the mechanically ventilated patient in the ICU is growing significantly. Literature focuses on patient assessment and management strategies for patient stressors, pain and sedation. Yet this literature is fragmentary by nature. The purpose of this paper is to provide a single comprehensive examination of the evidence related to the care of the mechanically ventilated patient. In part one of this two-part paper, the evidence on nursing care of the mechanically ventilated patient is explored with specific focus on patient safety: particularly patient and equipment assessment. Part two of the paper examines the evidence related to the mechanically ventilated patient's comfort, the patient/family unit, patient position, hygiene, management of stressors, pain management and sedation.
Resumo:
Web service composition is an important problem in web service based systems. It is about how to build a new value-added web service using existing web services. A web service may have many implementations, all of which have the same functionality, but may have different QoS values. Thus, a significant research problem in web service composition is how to select a web service implementation for each of the web services such that the composite web service gives the best overall performance. This is so-called optimal web service selection problem. There may be mutual constraints between some web service implementations. Sometimes when an implementation is selected for one web service, a particular implementation for another web service must be selected. This is so called dependency constraint. Sometimes when an implementation for one web service is selected, a set of implementations for another web service must be excluded in the web service composition. This is so called conflict constraint. Thus, the optimal web service selection is a typical constrained ombinatorial optimization problem from the computational point of view. This paper proposes a new hybrid genetic algorithm for the optimal web service selection problem. The hybrid genetic algorithm has been implemented and evaluated. The evaluation results have shown that the hybrid genetic algorithm outperforms other two existing genetic algorithms when the number of web services and the number of constraints are large.
Resumo:
Background: This study examined the quality of life (QOL), measured by the Functional Assessment of Cancer Therapy (FACT) questionnaire, among urban (n=277) and non-urban (n=323) breast cancer survivors and women from the general population (n=1140) in Queensland, Australia. ---------- Methods: Population-based samples of breast cancer survivors aged <75 years who were 12 months post-diagnosis and similarly-aged women from the general population were recruited between 2002 and 2007. ---------- Results: Age-adjusted QOL among urban and non-urban breast cancer survivors was similar, although QOL related to breast cancer concerns was the weakest domain and was lower among non-urban survivors than their urban counterparts (36.8 versus 40.4, P<0.01). Irrespective of residence, breast cancer survivors, on average, reported comparable scores on most QOL scales as their general population peers, although physical well-being was significantly lower among non-urban survivors (versus the general population, P<0.01). Overall, around 20%-33% of survivors experienced lower QOL than peers without the disease. The odds of reporting QOL below normative levels were increased more than two-fold for those who experienced complications following surgery, reported upper-body problems, had higher perceived stress levels and/or a poor perception of handling stress (P<0.01 for all). ---------- Conclusions: Results can be used to identify subgroups of women at risk of low QOL and to inform components of tailored recovery interventions to optimize QOL for these women following cancer treatment.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
Despite different political structures and planning systems, striking physical similarities exist between the tourist destinations of the Gold Coasts of Queensland and Florida. Both have been fast developing sub-tropical coastal areas, subject to massive land booms, speculation, and entrepreneurs’ grand visions throughout their history. As a result, both have become tourist destinations of international renown. Drawing on historical sources, the present research seeks to investigate the extent to which these similarities result from taking American cities as a model for newer development in Australia; in this case from transferring planning and marketing ideas from one Gold Coast to another, with the development of the Florida Gold Coast setting precedent for the development of the Queensland Gold Coast.
Resumo:
A point interpolation method with locally smoothed strain field (PIM-LS2) is developed for mechanics problems using a triangular background mesh. In the PIM-LS2, the strain within each sub-cell of a nodal domain is assumed to be the average strain over the adjacent sub-cells of the neighboring element sharing the same field node. We prove theoretically that the energy norm of the smoothed strain field in PIM-LS2 is equivalent to that of the compatible strain field, and then prove that the solution of the PIM- LS2 converges to the exact solution of the original strong form. Furthermore, the softening effects of PIM-LS2 to system and the effects of the number of sub-cells that participated in the smoothing operation on the convergence of PIM-LS2 are investigated. Intensive numerical studies verify the convergence, softening effects and bound properties of the PIM-LS2, and show that the very ‘‘tight’’ lower and upper bound solutions can be obtained using PIM-LS2.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
This paper takes Kent and Taylor’s (2002) call to develop a dialogic theory of public relations and suggests that a necessary first step is the modelling of the process of dialogic communication in public relations. In order to achieve this, extant literature from a range of fields is reviewed, seeking to develop a definition of dialogic communication that is meaningful to the practice of contemporary public relations. A simple transmission model of communication is used as a starting point. This is synthesised with concepts relating specifically to dialogue, taken here in its broadest sense rather than defined as any one particular outcome. The definition that emerges from this review leads to the conclusion that dialogic communication in public relations involves the interaction of three roles – those of sender, receiver, and responder. These three roles are shown to be adopted at different times by both participants involved in dialogic communication. It is further suggested that variations occur in how these roles are conducted: the sender and receiver roles can be approached in a passive or an active way, while the responder role can be classified as being either resistant or responsive to the information received in dialogic communication. The final modelling of the definition derived provides a framework which can be tested in the field to determine whether variations in the conduct of the roles in dialogic communication actually exist, and if so, whether they can be linked to the different types of outcome from dialogic communication identified previously in the literature.
Resumo:
Longitudinal data, where data are repeatedly observed or measured on a temporal basis of time or age provides the foundation of the analysis of processes which evolve over time, and these can be referred to as growth or trajectory models. One of the traditional ways of looking at growth models is to employ either linear or polynomial functional forms to model trajectory shape, and account for variation around an overall mean trend with the inclusion of random eects or individual variation on the functional shape parameters. The identification of distinct subgroups or sub-classes (latent classes) within these trajectory models which are not based on some pre-existing individual classification provides an important methodology with substantive implications. The identification of subgroups or classes has a wide application in the medical arena where responder/non-responder identification based on distinctly diering trajectories delivers further information for clinical processes. This thesis develops Bayesian statistical models and techniques for the identification of subgroups in the analysis of longitudinal data where the number of time intervals is limited. These models are then applied to a single case study which investigates the neuropsychological cognition for early stage breast cancer patients undergoing adjuvant chemotherapy treatment from the Cognition in Breast Cancer Study undertaken by the Wesley Research Institute of Brisbane, Queensland. Alternative formulations to the linear or polynomial approach are taken which use piecewise linear models with a single turning point, change-point or knot at a known time point and latent basis models for the non-linear trajectories found for the verbal memory domain of cognitive function before and after chemotherapy treatment. Hierarchical Bayesian random eects models are used as a starting point for the latent class modelling process and are extended with the incorporation of covariates in the trajectory profiles and as predictors of class membership. The Bayesian latent basis models enable the degree of recovery post-chemotherapy to be estimated for short and long-term followup occasions, and the distinct class trajectories assist in the identification of breast cancer patients who maybe at risk of long-term verbal memory impairment.