492 resultados para One-pass scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the past eight years, Australia has adopted the use of environmental offsets as a means to compensate for environmental degradation from development. Queensland has more environmental offsetting policies than any other Australian State or Territory. The methodology has profound effects on development companies, landowners (both private and public), regional land planning, organizations, government agencies, monetary banking institutions and environmental conservation bodies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Alternative dispute resolution (a.d.r.) processes are entrenched in western style legal systems. Forms of dispute resolution are utilised within schools and health systems; built in to commercial contracts; found in workplaces, clubs and organisations; and accepted in general day-to-day community disputes. The a.d.r. literature includes references to ‘apology’, but is largely silent on ‘forgiveness’. Where an apology is offered as part of a dispute resolution process, practice suggests that formalised ‘forgiveness’ rarely follows. Mediators may agree there is a meaningful place for apology in dispute resolution processes, but are most unlikely to support a view that forgiveness, as a conscious act, has an equivalent place. Yet, if forgiveness is not limited to the ‘pardoning of an offence’, but includes a ‘giving up of resentment’, or the relinquishing of a grudge, then forgiveness may play an underestimated role in dispute management. In the context of some day-to-day dispute management practice, this paper questions whether forgiveness should follow an apology; and concludes that meaningful resolutions can be reached without any formal element of ‘forgiveness’ or absolution. However, dispute management practitioners need to be aware of the latent role other aspects of forgiveness may play for the disputing parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Well, it has been Clem 7 month here in Brisbane and my impression is “so far, so good!” For those of you who know Brisbane, the four lane twin Clem Jones Tunnel (M7) is approximately 4.5km long, and connects Ipswich Road (A7) at the Princess Alexandra Hospital on the south side with Bowen Bridge Road (A3) at the Royal Brisbane Hospital on the north side. There are also south access ramps to the Pacific Motorway and east access ramps to Shafston Avenue (headed to/from Wynnum). Brisbanites have been enjoying a three week no-toll taste test, and I paced through it one evening with minimal fuss. The tunnel seems to have eased the congestion at the Stanley Street on-ramp to the Pacific Motorway quite a bit, and Ipswich Road – Main Street through the ‘Gabba. One must watch the signage carefully, but once we get used to the infrastructure, this will not likely be problematic. It will be interesting to see how traffic behaves when the system settles after tolling, which has likely commenced by the time you’re reading. I believe a passenger car toll is about $4.20 one way but saves about 24 signalised intersection pass-throughs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The self-assembling behavior and microscopic structure of zinc oxide nanoparticle Langmuir-Blodgett monolayer films were investigated for the case of zinc oxide nanoparticles coated with a hydrophobic layer of dodecanethiol. Evolution of nanoparticle film structure as a function of surface pressure (π) at the air-water interface was monitored in situ using Brewster’s angle microscopy, where it was determined that π=16 mN/m produced near-defect-free monolayer films. Transmission electron micrographs of drop-cast and Langmuir-Schaefer deposited films of the dodecanethiol-coated zinc oxide nanoparticles revealed that the nanoparticle preparation method yielded a microscopic structure that consisted of one-dimensional rodlike assemblies of nanoparticles with typical dimensions of 25 x 400 nm, encased in the organic dodecanethiol layer. These nanoparticle-containing rodlike micelles were aligned into ordered arrangements of parallel rods using the Langmuir-Blodgett technique.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NF-Y is a heterotrimeric transcription factor complex. Each of the NF-Y subunits (NF-YA, NF-YB and NF-YC) in plants is encoded by multiple genes. Quantitative RT-PCR analysis revealed that five wheat NF-YC members (TaNF-YC5, 8, 9, 11 & 12) were upregulated by light in both the leaf and seedling shoot. Co-expression analysis of Affymetrix wheat genome array datasets revealed that transcript levels of a large number of genes were consistently correlated with those of the TaNF-YC11 and TaNF-YC8 genes in 3-4 separate Affymetrix array datasets. TaNF-YC11-correlated transcripts were significantly enriched with the Gene Ontology term photosynthesis. Sequence analysis in the promoters of TaNF-YC11-correlated genes revealed the presence of putative NF-Y complex binding sites (CCAAT motifs). Quantitative RT-PCR analysis of a subset of potential TaNF-YC11 target genes showed that ten out of the thirteen genes were also light-upregulated in both the leaf and seedling shoot and had significantly correlated expression profiles with TaNF-YC11. The potential target genes for TaNF-YC11 include subunit members from all four thylakoid membrane bound complexes required for the conversion of solar energy into chemical energy and rate limiting enzymes in the Calvin cycle. These data indicate that TaNF-YC11 is potentially involved in regulation of photosynthesis-related genes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Complex surveillance problems are common in biosecurity, such as prioritizing detection among multiple invasive species, specifying risk over a heterogeneous landscape, combining multiple sources of surveillance data, designing for specified power to detect, resource management, and collateral effects on the environment. Moreover, when designing for multiple target species, inherent biological differences among species result in different ecological models underpinning the individual surveillance systems for each. Species are likely to have different habitat requirements, different introduction mechanisms and locations, require different methods of detection, have different levels of detectability, and vary in rates of movement and spread. Often there is a further challenge of a lack of knowledge, literature, or data, for any number of the above problems. Even so, governments and industry need to proceed with surveillance programs which aim to detect incursions in order to meet environmental, social and political requirements. We present an approach taken to meet these challenges in one comprehensive and statistically powerful surveillance design for non-indigenous terrestrial vertebrates on Barrow Island, a high conservation nature reserve off the Western Australian coast. Here, the possibility of incursions is increased due to construction and expanding industry on the island. The design, which includes mammals, amphibians and reptiles, provides a complete surveillance program for most potential terrestrial vertebrate invaders. Individual surveillance systems were developed for various potential invaders, and then integrated into an overall surveillance system which meets the above challenges using a statistical model and expert elicitation. We discuss the ecological basis for the design, the flexibility of the surveillance scheme, how it meets the above challenges, design limitations, and how it can be updated as data are collected as a basis for adaptive management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology-mediated collaboration process has been extensively studied for over a decade. Most applications with collaboration concepts reported in the literature focus on enhancing efficiency and effectiveness of the decision-making processes in objective and well-structured workflows. However, relatively few previous studies have investigated the applications of collaboration schemes to problems with subjective and unstructured nature. In this paper, we explore a new intelligent collaboration scheme for fashion design which, by nature, relies heavily on human judgment and creativity. Techniques such as multicriteria decision making, fuzzy logic, and artificial neural network (ANN) models are employed. Industrial data sets are used for the analysis. Our experimental results suggest that the proposed scheme exhibits significant improvement over the traditional method in terms of the time–cost effectiveness, and a company interview with design professionals has confirmed its effectiveness and significance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As detailed in Whitehead, Bunker and Chung (2011), a congestion-charging scheme provides a mechanism to combat congestion whilst simultaneously generating revenue to improve both the road and public transport networks. The aim of this paper is to assess the feasibility of implementing a congestion-charging scheme in the city of Brisbane in Australia and determine the potential effects of this initiative. In order to so, a congestion-charging scheme was designed for Brisbane and modelled using the Brisbane Strategic Transport Model with a base line year of 2026. This paper argues that the implementation of this initiative would prove to be effective in reducing the cities road congestion and increasing the overall sustainability of the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed pipeline assets systems are crucial to society. The deterioration of these assets and the optimal allocation of limited budget for their maintenance correspond to crucial challenges for water utility managers. Decision makers should be assisted with optimal solutions to select the best maintenance plan concerning available resources and management strategies. Much research effort has been dedicated to the development of optimal strategies for maintenance of water pipes. Most of the maintenance strategies are intended for scheduling individual water pipe. Consideration of optimal group scheduling replacement jobs for groups of pipes or other linear assets has so far not received much attention in literature. It is a common practice that replacement planners select two or three pipes manually with ambiguous criteria to group into one replacement job. This is obviously not the best solution for job grouping and may not be cost effective, especially when total cost can be up to multiple million dollars. In this paper, an optimal group scheduling scheme with three decision criteria for distributed pipeline assets maintenance decision is proposed. A Maintenance Grouping Optimization (MGO) model with multiple criteria is developed. An immediate challenge of such modeling is to deal with scalability of vast combinatorial solution space. To address this issue, a modified genetic algorithm is developed together with a Judgment Matrix. This Judgment Matrix is corresponding to various combinations of pipe replacement schedules. An industrial case study based on a section of a real water distribution network was conducted to test the new model. The results of the case study show that new schedule generated a significant cost reduction compared with the schedule without grouping pipes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this thesis has been to map the ethical journey of experienced nurses now practising in rural and remote hospitals in central and south-west Queensland and in domiciliary services in Brisbane. One group of the experienced nurses in the study were Directors of Nursing in rural and remote hospitals. These nurses were “hands on”, “multi-skilled “ nurses who also had the task of managing the hospital. Also there were two Directors of Nursing from domiciliary services in Brisbane. A grounded theory method was used. The nurses were interviewed and the data retrieved from the interviews was coded, categorised and from these categories a conceptual framework was generated. The literature which dealt with the subject of ethical decision making and nurses also became part of the data. The study revealed that all these nurses experienced moral distress as they made ethical decisions. The decision making categories revealed in the data were: the area of financial management; issues as end of life approaches; allowing to die with dignity; emergency decisions; experience of unexpected death; the dilemma of providing care in very difficult circumstances. These categories were divided into two chapters: the category related to administrative and financial constraints and categories dealing with ethical issues in clinical settings. A further chapter discussed the overarching category of coping with moral distress. These experienced nurses suffered moral distress as they made ethical decisions, confirming many instances of moral distress in ethical decision making documented in the literature to date. Significantly, the nurses in their interviews never mentioned the ethical principles used in bioethics as an influence in their decision making. Only one referred to lectures on ethics as being an influence in her thinking. As they described their ethical problems and how they worked through them, they drew on their own previous experience rather than any knowledge of ethics gained from nursing education. They were concerned for their patients, they spoke from a caring responsibility towards their patients, but they were also concerned for justice for their patients. This study demonstrates that these nurses operated from the ethic of care, tempered with the ethic of responsibility as well as a concern for justice for their patients. Reflection on professional experience, rather than formal ethics education and training, was the primary influence on their ethical decision making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The provision of shelter is a basic need and in Australia there has been a history of home ownership. However recent economic growth and rising construction costs, particularly over the past decade, has placed home ownership out of reach for some. In response to increased affordability pressures, the Australian Federal Government established the National Rental Affordability Scheme (NRAS) in 2008. The aim of establishing the NRAS initiative is to stimulate the supply of new affordable rental dwellings, targeting 50,000 new properties by June 2012, through the provision of a National Rental Incentive for each “approved” dwelling. To be approved the dwelling must be newly constructed and subsequently rented to eligible low and moderate income households at rentals no greater than 80 percent of market rates. There is a further requirement that the accommodation be provided as part of the scheme for no less than 10 years. The requirement to provide new residential accommodation at below market rentals for no less than 10 years has an impact on value and as such the valuation methodologies employed. To give guidance to valuers this paper investigates the scheme, the impact on value and expectations for the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The introduction by the Australian federal government of its Carbon Pollution Reduction Scheme was a decisive step in the transformation of Australia into a low carbon economy. Since the release of the Scheme, however, political discourse relating to environmental sustainability and climate change in Australia has focused primarily on political, scientific and economic issues. Insufficient attention has been paid to the financial opportunities which commoditisation of the carbon market may offer, and little emphasis has been placed on the legal implications for the creation of a "new" asset and market. This article seeks to shed some light on the discernable opportunities which the Scheme should provide to participants in the Australian and international debt markets.