180 resultados para Galaxy: open clusters and associations: individual
Resumo:
In the last two decades there has been a plethora of research on a range of subjects collectively and rhetorically known as ‘work-life balance’. The bulk of this research, which spans disciplines including feminist sociology, industrial relations and management, has focused on the significant concerns of employed women and/or dual career couples. Less attention has been devoted to scholarship which explicitly examines men and masculinities in this context. Meanwhile, public and organizational discourse is largely espoused in gender neutral terms, often neglecting salient gendered issues which differentially impact the ability of women and men to successfully integrate their work and non-work lives. This edited book brings together empirical studies of the work-life nexus with a specific focus on men’s working time arrangements, how men navigate and traverse paid work and family commitments, and the impact of public and organizational policies on men’s participation in work, leisure, and other life domains. The book is innovative in that it presents both macro (institutional, how policy affects practice) and micro (individual, from men’s own perspectives) level studies, allowing for a rich and contrasting exploration of how men’s participation in paid work and other domains is divided, conflicted, or integrated. The essays in this volume address issues of fundamental social, labor market, and economic change which have occurred over the last 20 years and which have profoundly affected the way work, care, leisure and community have evolved in different contexts. Taking an international focus, Men, Wage Work and Family contrasts various public and organizational policies and how these policies impact men’s opportunities and participation in paid work and non-work domains in industrialised countries in Europe, North America, and Australia.
Resumo:
The overall objective of this thesis is to explore how and why the content of individuals' psychological contracts changes over time. The contract is generally understood as "individual beliefs, shaped by the organisation, regarding the terms of an exchange agreement between individuals and their organisation" (Rousseau, 1995, p. 9). With an overall study sampling frame of 320 graduate organisational newcomers, a mixed method longitudinal research design comprised of three sequential, inter-related studies is employed in order to capture the change process. From the 15 semi-structured interviews conducted in Study 1, the key findings included identifying a relatively high degree of mutuality between employees' and their managers' reciprocal contract beliefs around the time of organisational entry. Also, at this time, individuals had developed specific components of their contract content through a mix of social network information (regarding broader employment expectations) and perceptions of various elements of their particular organisation's reputation (for more firm-specific expectations). Study 2 utilised a four-wave survey approach (available to the full sampling frame) over the 14 months following organisational entry to explore the 'shape' of individuals' contract change trajectories and the role of four theorised change predictors in driving these trajectories. The predictors represented an organisational-level informational cue (perceptions of corporate reputation), a dyadic-level informational cue (perceptions of manager-employee relationship quality) and two individual difference variables (affect and hardiness). Through the use of individual growth modelling, the findings showed differences in the general change patterns across contract content components of perceived employer (exhibiting generally quadratic change patterns) and employee (exhibiting generally no-change patterns) obligations. Further, individuals differentially used the predictor variables to construct beliefs about specific contract content. While both organisational- and dyadic-level cues were focused upon to construct employer obligation beliefs, organisational-level cues and individual difference variables were focused upon to construct employee obligation beliefs. Through undertaking 26 semi-structured interviews, Study 3 focused upon gaining a richer understanding of why participants' contracts changed, or otherwise, over the study period, with a particular focus upon the roles of breach and violation. Breach refers to an employee's perception that an employer obligation has not been met and violation refers to the negative and affective employee reactions which may ensue following a breach. The main contribution of these findings was identifying that subsequent to a breach or violation event a range of 'remediation effects' could be activated by employees which, depending upon their effectiveness, served to instigate either breach or contract repair or both. These effects mostly instigated broader contract repair and were generally cognitive strategies enacted by an individual to re-evaluate the breach situation and re-focus upon other positive aspects of the employment relationship. As such, the findings offered new evidence for a clear distinction between remedial effects which serve to only repair the breach (and thus the contract) and effects which only repair the contract more broadly; however, when effective, both resulted in individuals again viewing their employment relationships positively. Overall, in response to the overarching research question of this thesis, how and why individuals' psychological contract beliefs change, individuals do indeed draw upon various information sources, particularly at the organisational-level, as cues or guides in shaping their contract content. Further, the 'shapes' of the changes in beliefs about employer and employee obligations generally follow different, and not necessarily linear, trajectories over time. Finally, both breach and violation and also remedial actions, which address these occurrences either by remedying the breach itself (and thus the contract) or the contract only, play central roles in guiding individuals' contract changes to greater or lesser degrees. The findings from the thesis provide both academics and practitioners with greater insights into how employees construct their contract beliefs over time, the salient informational cues used to do this and how the effects of breach and violation can be mitigated through creating an environment which facilitates the use of effective remediation strategies.
Resumo:
In England and Australia, higher education institutions (HEIs) are expected to widen participation (WP) in higher education (HE) to enhance social justice and improve individual and national economic returns. Furthermore, HEIs are the major providers of initial and in-service teacher education. This article surveys international literature to explore ways in which teacher education programmes could and do contribute to preparing teachers to advocate for WP, including drawing on learning from WP research that demonstrates the value of current HE students engaging young people in schools and colleges to support them in seriously considering progressing to HE. We conclude that teachers and pre-service teachers are well placed to be advocates for WP. In the majority of higher education institutions, however, WP and teacher education functions are not working collaboratively to embed advocacy for WP into teacher education programmes.
Resumo:
Smart antenna receiver and transmitter systems consist of multi-port arrays with an individual receiver channel (including ADC) and an individual transmitter channel (including DAC)at every of the M antenna ports, respectively. By means of digital beamforming, an unlimited number of simultaneous complex-valued vector radiation patterns with M-1 degrees of freedom can be formed. Applications of smart antennas in communication systems include space-division multiple access. If both stations of a communication link are equipped with smart antennas (multiple-input-multiple-output, MIMO). multiple independent channels can be formed in a "multi-path-rich" environment. In this article, it will be shown that under certain circumstances, the correlation between signals from adjacent ports of a dense array (M + ΔM elements) can be kept as low as the correlation between signals from adjacent ports of a conventional array (M elements and half-wavelength pacing). This attractive feature is attained by means of a novel approach which employs a RF decoupling network at the array ports in order to form new ports which are decoupled and associated with mutually orthogonal (de-correlated) radiation patterns.
Resumo:
Does exercise promote weight loss? One of the key problems with studies assessing the efficacy of exercise as a method of weight management and obesityis that mean data are presented and the individual variability in response is overlooked. Recent data have highlighted the need to demonstrate and characterise the individual variability in response to exercise. Do people who exercise compensate for the increase in energy expenditure via compensatory increases in hunger and food intake? The authors address the physiological, psychological and behavioural factors potentially involved in the relationship between exercise and appetite, and identify the research questions that remain unanswered. A negative consequence of the phenomena of individual variability and compensatory responses has been the focus on those who lose little weight in response to exercise; this has been used unreasonably as evidence to suggest that exercise is a futile method of controlling weight and managing obesity. Most of the evidence suggests that exercise is useful for improving body composition and health. For example, when exercise-induced mean weight loss is <1.0 kg, significant improvements in aerobic capacity (+6.3 ml/kg/min), systolic (−6.00 mm Hg) and diastolic (−3.9 mm Hg) blood pressure, waist circumference (−3.7 cm) and positive mood still occur. However, people will vary in their responses to exercise; understanding and characterising this variability will help tailor weight loss strategies to suit individuals.
Resumo:
Background: Falciparum malaria is the most deadly among the four main types of human malaria. Although great success has been achieved since the launch of the National Malaria Control Programme in 1955, malaria remains a serious public health problem in China. This paper aimed to analyse the geographic distribution, demographic patterns and time trends of falciparum malaria in China. Methods: The annual numbers of falciparum malaria cases during 1992–2003 and the individual case reports of each clinical falciparum malaria during 2004–2005 were extracted from communicable disease information systems in China Center for Diseases Control and Prevention. The annual number of cases and the annual incidence were mapped by matching them to corresponding province- and county-level administrative units in a geographic information system. The distribution of falciparum malaria by age, gender and origin of infection was analysed. Time-series analysis was conducted to investigate the relationship between the falciparum malaria in the endemic provinces and the imported falciparum malaria in non-endemic provinces. Results: Falciparum malaria was endemic in two provinces of China during 2004–05. Imported malaria was reported in 26 non-endemic provinces. Annual incidence of falciparum malaria was mapped at county level in the two endemic provinces of China: Yunnan and Hainan. The sex ratio (male vs. female) for the number of cases in Yunnan was 1.6 in the children of 0–15 years and it reached 5.7 in the adults over 15 years of age. The number of malaria cases in Yunnan was positively correlated with the imported malaria of concurrent months in the non-endemic provinces. Conclusion: The endemic area of falciparum malaria in China has remained restricted to two provinces, Yunnan and Hainan. Stable transmission occurs in the bordering region of Yunnan and the hilly-forested south of Hainan. The age and gender distribution in the endemic area is characterized by the predominance of adult men cases. Imported falciparum malaria in the non-endemic area of China, affected mainly by the malaria transmission in Yunnan, has increased both spatially and temporally. Specific intervention measures targeted at the mobile population groups are warranted.
Resumo:
Recent decades have witnessed a global acceleration of legislative and private sector initiatives to deal with Cross-Border insolvency. Legislative institutions include the various national implementations of the Model Law on Cross-Border Insolvency (Model Law) published by the United Nations Commission on International Trade (UNCITRAL).3 Private mechanisms include Cross-Border protocols developed and utilised by insolvency professionals and their advisers (often with the imprimatur of the judiciary), on both general and ad hoc bases. The Asia Pacific region has not escaped the effect of those developments, and the economic turmoil of the past few years has provided an early test for some of the emerging initiatives in that region. This two-part article explores the operation of those institutions through the medium of three recent cases.
Resumo:
Recent decades have witnessed a global acceleration of legislative and private sector initiatives to deal with Cross-Border insolvency. Legislative institutions include the various national implementations of the Model Law on Cross-Border Insolvency (Model Law) published by the United Nations Commission on International Trade (UNCITRAL).3 Private mechanisms include Cross-Border protocols developed and utilised by insolvency professionals and their advisers (often with the imprimatur of the judiciary), on both general and ad hoc bases. The Asia Pacific region has not escaped the effect of those developments, and the economic turmoil of the past few years has provided an early test for some of the emerging initiatives in that region. This two-part article explores the operation of those institutions through the medium of three recent cases.
Resumo:
Allyson Reynolds, for many years now, has been a keen student of nature. Nature’s forms have always been important to her work, but it would be wrong to see Reynolds as simply transcribing directly from the natural world. For this artist, nature and the natural world represents an elusive invitation and so Reynolds doesn’t so much paint from nature, although resemblance and imitation are clearly evident, as work to render visually and emotionally tangible this invitation. And for a viewer this is no small thing as the invitation is to become attuned and connect with nature as it exists in ourselves, that is to see as nature. Reynolds’ is inviting us as viewers to connect and participate with the nature of nature that is evident in ourselves through the act of perceiving. Reynolds’ work can do this because it is a work born of deep evocation. The sensibility from which it emerges or is transacted is poetic, intensely so, but more than that it works to make of viewing an act of poetry, through a celebration of seeing. Reynolds evocation is born of a deep feeling towards and contemplation of the natural world - it is as though the world lives in her and is now a seamless part of her creative vocabulary. In such personal work there is a profoundly felt and revealed sense of the intimate and like true intimacy it revels in both its dark and quiet, as well as its playful and light, aspects. What is special about Reynolds’ visual poetry is that it able to render this intimacy so accessible. It is an accessibility that is available for the viewer who is able to not only look but also surrender to that looking, accepting and working with the flow of thoughts and associations it occasions...
Resumo:
Debugging control software for Micro Aerial Vehicles (MAV) can be risky out of the simulator, especially with professional drones that might harm people around or result in a high bill after a crash. We have designed a framework that enables a software application to communicate with multiple MAVs from a single unified interface. In this way, visual controllers can be first tested on a low-cost harmless MAV and, after safety is guaranteed, they can be moved to the production MAV at no additional cost. The framework is based on a distributed architecture over a network. This allows multiple configurations, like drone swarms or parallel processing of drones' video streams. Live tests have been performed and the results show comparatively low additional communication delays, while adding new functionalities and flexibility. This implementation is open-source and can be downloaded from github.com/uavster/mavwork
Resumo:
Introduction and aims: Individual smokers from disadvantaged backgrounds are less likely to quit, which contributes to widening inequalities in smoking. Residents of disadvantaged neighbourhoods are more likely to smoke, and neighbourhood inequalities in smoking may also be widening because of neighbourhood differences in rates of cessation. This study examined the association between neighbourhood disadvantage and smoking cessation and its relationship with neighbourhood inequalities in smoking. Design and methods: A multilevel longitudinal study of mid-aged (40-67 years) residents (n=6915) of Brisbane, Australia, who lived in the same neighbourhoods (n=200) in 2007 and 2009. Neighbourhood inequalities in cessation and smoking were analysed using multilevel logistic regression and Markov chain Monte Carlo simulation. Results: After adjustment for individual-level socioeconomic factors, the probability of quitting smoking between 2007 and 2009 was lower for residents of disadvantaged neighbourhoods (9.0%-12.8%) than their counterparts in more advantaged neighbourhoods (20.7%-22.5%). These inequalities in cessation manifested in widening inequalities in smoking: in 2007 the between-neighbourhood variance in rates of smoking was 0.242 (p≤0.001) and in 2009 it was 0.260 (p≤0.001). In 2007, residents of the most disadvantaged neighbourhoods were 88% (OR 1.88, 95% CrI 1.41-2.49) more likely to smoke than residents in the least disadvantaged neighbourhoods: the corresponding difference in 2009 was 98% (OR 1.98 95% CrI 1.48-2.66). Conclusion: Fundamentally, social and economic inequalities at the neighbourhood and individual-levels cause smoking and cessation inequalities. Reducing these inequalities will require comprehensive, well-funded, and targeted tobacco control efforts and equity based policies that address the social and economic determinants of smoking.
Resumo:
This article analyses the inconsistent approaches taken by courts when interpreting provisions of the Corporations Act which address debts or expenses “incurred” by receivers, administrators and liquidators. The article contends for a consistent construction of these provisions which will enable the legislation to operate (as was intended) for the benefit of persons who supply goods, services or labour to companies in external administration. The article explains how and why debts can be “incurred” by insolvency practitioners continuing on pre-existing contracts. Specifically, the article contends for a construction of ss 419 and 443A of the Corporations Act which renders receivers and administrators personally liable for certain entitlements of employees (eg, wages and superannuation contributions) which become due and payable by reason of the decision of a receiver or administrator to continue a pre-existing contract rather than terminate it.
Resumo:
High heat-producing granites (HHPGs) are reservoir rocks for enhanced geothermal systems (EGS), yet the origins of their anomalous chemistry remain poorly understood. To gain a better understanding of the characteristic distribution of elemental depletions and enrichments (focussing on U, Th & K) within granite suites of different heritage and tectonic setting, and the processes that lead to these enrichments, we are undertaking a systematic accessory-mineral chronochemical study of two suites of S- and I-type granites in northern Queensland, as well as two archetypal HHPGs in Cornwall, England (S-type) and Soultz-sous- Forêts, France (I-type). Novel zircon LA-ICP-MS chronochemical methods will later be underpinned by a systematic petrographic, scanning electron microscope (SEM), and electron microprobe (EPMA) study of all the REE-Y-Th-U-rich accessory minerals to fully characterise how the composition, textural distributions and associations change with rock chemistry between and among the suites. Preliminary results indicate that zircons with inherited ages do not have anomalously high U (>1000 ppm) & Th (>400 ppm) values (Ahrens, 1965). Instead, enrichment in these HPE is seen in zircons dated to around the time of magmatic emplacement. These results indicate that enrichment arose primarily through fractional crystallisation of the granitic magmas. Our results support the suggestion that a source pre-enriched in the HPEs does not appear to be fundamental for the formation of all HHPGs. Instead fractional crystallisation processes, and the accessory minerals formed in magmas of differing initial compositions, are the key controls on the levels of enrichment observed (e.g. Champion & Chappell, 1992; Chappell & Hine, 2006). One implication is that the most fractionated granites may not be the most enriched in the HPEs and therefore prospective to future EGS development.
Resumo:
Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. The result is a collection of process models -- each one representing a variant of the business process -- as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically by means of subprocess extraction. The proposed technique allows users to set a desired bound for the complexity of the produced models. Experiments on real-life logs show that the technique produces collections of models that are up to 64% smaller than those extracted under the same complexity bounds by applying existing trace clustering techniques.
Resumo:
The Queensland University of Technology (QUT) Library, like many other academic and research institution libraries in Australia, has been collaborating with a range of academic and service provider partners to develop a range of research data management services and collections. Three main strategies are being employed and an overview of process, infrastructure, usage and benefits is provided of each of these service aspects. The development of processes and infrastructure to facilitate the strategic identification and management of QUT developed datasets has been a major focus. A number of Australian National Data Service (ANDS) sponsored projects - including Seeding the Commons; Metadata Hub / Store; Data Capture and Gold Standard Record Exemplars have / will provide QUT with a data registry system, linkages to storage, processes for identifying and describing datasets, and a degree of academic awareness. QUT supports open access and has established a culture for making its research outputs available via the QUT ePrints institutional repository. Incorporating open access research datasets into the library collections is an equally important aspect of facilitating the adoption of data-centric eresearch methods. Some datasets are available commercially, and the library has collaborated with QUT researchers, in the QUT Business School especially strongly, to identify and procure a rapidly growing range of financial datasets to support research. The library undertakes licensing and uses the Library Resource Allocation to pay for the subscriptions. It is a new area of collection development for with much to be learned. The final strategy discussed is the library acting as “data broker”. QUT Library has been working with researchers to identify these datasets and undertake the licensing, payment and access as a centrally supported service on behalf of researchers.