216 resultados para initial algebraic concepts


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organized crime in the twenty-first century is a knowledge war that poses an incalculable global threat to the world economy and harm to society - the economic and social costs are estimated at upwards of L20 billion a year for the UK alone (SOCA 2006/7). Organized Crime: Policing Illegal Business Entrepreneurialism offers a unique approach to the tackling of this area by exploring how it works through the conceptual framework of a business enterprise. Structured in three parts, the book progresses systematically through key areas and concepts integral to dealing effectively with the myriad contemporary forms of organised crime and provides insights on where, how and when to disrupt and dismantle a criminal business activity through current policing practices and policies. From the initial set up of a crime business through to the long term forecasting for growth and profitability, the authors dissect and analyse the different phases of the business enterprise and propose a 'Knowledge-Managed Policing' (KMP) approach to criminal entrepreneurialism. Combining conceptual and practical issues, this is a must-have reference for all police professionals, policing academics and government policy makers who are interested in a Strategy-led, Intelligence supported, Knowledge-Managed approach to policing illegal business entrepreneurialism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a growing desire for boards of nonprofits to deliver better governance to the organizations they control. Consequently, self-evaluation has become an important tool for nonprofit boards to meet these expectations and demonstrate that they are discharging their responsibilities effectively. This article describes initial results aimed at developing a psychometrically sound, survey-based board evaluation instrument, based on the Team Development Survey (TDS), that assesses the team attributes of an organization’s board. Our results indicate that while constructs applicable to teams generally appear to apply to boards, there are also important differences. We highlight how a perception of board objective clarity, appropriate skills mix, resource availability, and psychological safety were positively and significantly associated with measures of board, management and organizational performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many user studies in Web information searching have found the significant effect of task types on search strategies. However, little attention was given to Web image searching strategies, especially the query reformulation activity despite that this is a crucial part in Web image searching. In this study, we investigated the effects of topic domains and task types on user’s image searching behavior and query reformulation strategies. Some significant differences in user’s tasks specificity and initial concepts were identified among the task domains. Task types are also found to influence participant’s result reviewing behavior and query reformulation strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Commencing 13 March 2000, the Corporate Law Economic Reform Program Act 1999 (Cth) introduced changes to the regulation of corporate fundraising in Australia. In particular, it effected a reduction in the litigation risk associated with initial public offering prospectus disclosure.We find that the change is associated with a reduction in forecast frequency and an increase in forecast value relevance, but not with forecast error or bias. These results confirm previous findings that changes in litigation risk affect the level but not the quality of disclosure. They also suggest that the reforms’ objectives of reducing fundraising costs while improving investor protection, have been achieved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This fourth edition of Communication, Cultural and Media Studies: The Key Concepts is an indispensible guide to the most important terms in the field. It offers clear explanations of the key concepts, exploring their origins, what they’re used for and why they provoke discussion. The author provides a multi-disciplinary explanation and assessment of the key concepts, from ‘authorship’ to ‘censorship’; ‘creative industries’ to ‘network theory’; ‘complexity’ to ‘visual culture’. The new edition of this classic text includes: * Over 200 entries including 50 new entries * All entries revised, rewritten and updated * Coverage of recent developments in the field * Insight into interactive media and the knowledge-based economy * A fully updated bibliography with 400 items and suggestions for further reading throughout the text

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compositionality is a frequently made assumption in linguistics, and yet many human subjects reveal highly non-compositional word associations when confronted with novel concept combinations. This article will show how a non-compositional account of concept combinations can be supplied by modelling them as interacting quantum systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question of under what conditions conceptual representation is compositional remains debatable within cognitive science. This paper proposes a well developed mathematical apparatus for a probabilistic representation of concepts, drawing upon methods developed in quantum theory to propose a formal test that can determine whether a specific conceptual combination is compositional, or not. This test examines a joint probability distribution modeling the combination, asking whether or not it is factorizable. Empirical studies indicate that some combinations should be considered non-compositionally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the late 20th century it was proposed that a design aesthetic reflecting current ecological concerns was required within the overall domain of the built environment and specifically within landscape design. To address this, some authors suggested various theoretical frameworks upon which such an aesthetic could be based. Within these frameworks there was an underlying theme that the patterns and processes of Nature may have the potential to form this aesthetic — an aesthetic based on fractal rather than Euclidean geometry. In order to understand how fractal geometry, described as the geometry of Nature, could become the referent for a design aesthetic, this research examines the mathematical concepts of fractal Geometry, and the underlying philosophical concepts behind the terms ‘Nature’ and ‘aesthetics’. The findings of this initial research meant that a new definition of Nature was required in order to overcome the barrier presented by the western philosophical Nature¯culture duality. This new definition of Nature is based on the type and use of energy. Similarly, it became clear that current usage of the term aesthetics has more in common with the term ‘style’ than with its correct philosophical meaning. The aesthetic philosophy of both art and the environment recognises different aesthetic criteria related to either the subject or the object, such as: aesthetic experience; aesthetic attitude; aesthetic value; aesthetic object; and aesthetic properties. Given these criteria, and the fact that the concept of aesthetics is still an active and ongoing philosophical discussion, this work focuses on the criteria of aesthetic properties and the aesthetic experience or response they engender. The examination of fractal geometry revealed that it is a geometry based on scale rather than on the location of a point within a three-dimensional space. This enables fractal geometry to describe the complex forms and patterns created through the processes of Wild Nature. Although fractal geometry has been used to analyse the patterns of built environments from a plan perspective, it became clear from the initial review of the literature that there was a total knowledge vacuum about the fractal properties of environments experienced every day by people as they move through them. To overcome this, 21 different landscapes that ranged from highly developed city centres to relatively untouched landscapes of Wild Nature have been analysed. Although this work shows that the fractal dimension can be used to differentiate between overall landscape forms, it also shows that by itself it cannot differentiate between all images analysed. To overcome this two further parameters based on the underlying structural geometry embedded within the landscape are discussed. These parameters are the Power Spectrum Median Amplitude and the Level of Isotropy within the Fourier Power Spectrum. Based on the detailed analysis of these parameters a greater understanding of the structural properties of landscapes has been gained. With this understanding, this research has moved the field of landscape design a step close to being able to articulate a new aesthetic for ecological design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Potyviruses are found world wide, are spread by probing aphids and cause considerable crop damage. Potyvirus is one of the two largest plant virus genera and contains about 15% of all named plant virus species. When and why did the potyviruses become so numerous? Here we answer the first question and discuss the other. Methods and Findings: We have inferred the phylogenies of the partial coat protein gene sequences of about 50 potyviruses, and studied in detail the phylogenies of some using various methods and evolutionary models. Their phylogenies have been calibrated using historical isolation and outbreak events: the plum pox virus epidemic which swept through Europe in the 20th century, incursions of potyviruses into Australia after agriculture was established by European colonists, the likely transport of cowpea aphid-borne mosaic virus in cowpea seed from Africa to the Americas with the 16th century slave trade and the similar transport of papaya ringspot virus from India to the Americas. Conclusions/Significance: Our studies indicate that the partial coat protein genes of potyviruses have an evolutionary rate of about 1.1561024 nucleotide substitutions/site/year, and the initial radiation of the potyviruses occurred only about 6,600 years ago, and hence coincided with the dawn of agriculture. We discuss the ways in which agriculture may have triggered the prehistoric emergence of potyviruses and fostered their speciation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Initial crack widely exists in the welded members of steel bridge induced by the welding procedure or by the fatigue damage crack initiation. The behavior of crack growth with a view to fatigue damage accumulation on the tip of cracks is discussed. Fatigue life of welded components with initial crack in bridges under traffic loading is investigated. Based on existing fatigue experiment results of welded members with initial crack and the fatigue experiment results of welded bridge members under constant stress cycles, the crack would keep semi-elliptical shape with variable ratio of a/c during the crack propagation. Based on the concept of continuum damage accumulated on the tip of fatigue cracks,the fatigue damage law suitable for steel bridge members under traffic loading is modified to consider the crack growth.The virtual crack growth method and the semi-elliptical crack shape assumption are proposed in this paper to deduce a new model of fatigue crack growth rate for welded bridge members under traffic loading. And the calculated method of the stress intensity factor necessary for evaluation of the fatigue life of welded bridge members with cracks is discussed.The proposed fatigue crack growth model is then applied to calculate the crack growth and the fatigue life of existing welded members with fatigue experimental results. The fatigue crack propagation computation results show that the ratio of crack depth to the half crack surface length a/c is variable during crack propagation process and the stress cycle increases with the increase of a0/c0 with certain a0/t0 .The calculated and measured fatigue lives are generally in good agreement,at some initial conditions of cracking, for welded members widely used in steel bridges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: Whilst motorcycle rider training is commonly incorporated into licensing programs in many developed nations, little empirical support has been found in previous research to prescribe it as an effective road safety countermeasure. It has been posited that the lack of effect of motorcycle rider training on crash reduction may, in part, be due to the predominant focus on skills-based training with little attention devoted to addressing attitudes and motives that influence subsequent risky riding. However, little past research has actually endeavoured to measure attitudinal and motivational factors as a function of rider training. Accordingly, this study was undertaken to assess the effect of a commercial motorcycle rider training program on psychosocial factors that have been shown to influence risk taking by motorcyclists. Method: Four hundred and thirty-eight motorcycle riders attending a competency-based licence training course in Brisbane, Australia, voluntarily participated in the study. A self-report questionnaire adapted from the Rider Risk Assessment Measure (RRAM) was administered to participants at the commencement of training, then again at the conclusion of training. Participants were informed of the independent nature of the research and that their responses would in no way effect their chance of obtaining a licence. To minimise potential demand characteristics, participants were instructed to seal completed questionnaires in envelopes and place them in a sealed box accessible only by the research team (i.e. not able to be viewed by instructors). Results: Significant reductions in the propensity for thrill seeking and intentions to engage in risky riding in the next 12 months were found at the end of training. In addition, a significant increase in attitudes to safety was found. Conclusions: These findings indicate that rider training may have a positive short-term influence on riders’ propensity for risk taking. However, such findings must be interpreted with caution in regard to the subsequent safety of riders as these factors may be subject to further influence once riders are licensed and actively engage with peers during on-road riding. This highlights a challenge for road safety education / training programs in regard to the adoption of safety practices and the need for behavioural follow-up over time to ascertain long-term effects. This study was the initial phase of an ongoing program of research into rider training and risk taking framed around Theory of Planned Behaviour concepts. A subsequent 12 month follow-up of the study participants has been undertaken with data analysis pending.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The quick detection of abrupt (unknown) parameter changes in an observed hidden Markov model (HMM) is important in several applications. Motivated by the recent application of relative entropy concepts in the robust sequential change detection problem (and the related model selection problem), this paper proposes a sequential unknown change detection algorithm based on a relative entropy based HMM parameter estimator. Our proposed approach is able to overcome the lack of knowledge of post-change parameters, and is illustrated to have similar performance to the popular cumulative sum (CUSUM) algorithm (which requires knowledge of the post-change parameter values) when examined, on both simulated and real data, in a vision-based aircraft manoeuvre detection problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.