158 resultados para Passé

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The fashion ecosystem is at boiling point as consumers turn up the heat in all areas of the fashion value, trend and supply chain. While traditionally fashion has been a monologue from designer brand to consumer, new technology and the virtual world has given consumers a voice to engage brands in a conversation to express evolving needs, ideas and feedback. Product customisation is no longer innovative. Successful brands are including customers in the design process and holding conversations ‘with’ them to improve product, manufacturing, sales, distribution, marketing and sustainable business practices. Co-creation and crowd sourcing are integral to any successful business model and designers and manufacturers are supplying the technology or tools for these creative, active, participatory ‘prosumers’. With this collaboration however, there arises a worrying trend for fashion professionals. The ‘design it yourself’, ‘indiepreneur’ who with the combination of technology, the internet, excess manufacturing capacity, crowd funding and the idea of sharing the creative integrity of a product (‘copyleft’ not copyright) is challenging the notion that the fashion supply chain is complex. The passive ‘consumer’ no longer exists. Fashion designers now share the stage with ‘amateur’ creators who are disrupting every activity they touch, while being motivated by profit as well as a quest for originality and innovation. This paper examines the effects this ‘consumer’ engagement is having on traditional fashion models and the fashion supply chain. Crowd sourcing, crowd funding, co-creating, design it yourself, global sourcing, the virtual supply chain, social media, online shopping, group buying, consumer to consumer marketing and retail, and branding the ‘individual’ are indicative of the new consumer-driven fashion models. Consumers now drive the fashion industry - from setting trends, through to creating, producing, selling and marketing product. They can turn up the heat at any time _ and any point _ in the fashion supply chain. They are raising the temperature at each and every stage of the chain, decreasing or eliminating the processes involved: decreasing the risk of fashion obsolescence, quantities for manufacture, complexity of distribution and the consumption of product; eliminating certain stages altogether and limiting the brand as custodians of marketing. Some brands are discovering a new ‘enemy’ – the very people they are trying to sell to. Keywords: fashion supply chain, virtual world, consumer, ‘prosumers’, co-creation, fashion designers

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: The evaluation of retinal image quality in cataract eyes has gained importance and the clinical modulation transfer functions (MTF) can obtained by aberrometer and double pass (DP) system. This study aimed to compare MTF derived from a ray tracing aberrometer and a DP system in early cataractous and normal eyes. METHODS: There were 128 subjects with 61 control eyes and 67 eyes with early cataract defined according to the Lens Opacities Classification System III. A laser ray-tracing wavefront aberrometer (iTrace) and a double pass (DP) system (OQAS) assessed ocular MTF for 6.0 mm pupil diameters following dilation. Areas under the MTF (AUMTF) and their correlations were analyzed. Stepwise multiple regression analysis assessed factors affecting the differences between iTrace- and OQAS-derived AUMTF for the early cataract group. RESULTS: For both early cataract and control groups, iTrace-derived MTFs were higher than OQAS-derived MTFs across a range of spatial frequencies (P < 0.01). No significant difference between the two groups occurred for iTrace-derived AUMTF, but the early cataract group had significantly smaller OQAS-derived AUMTF than did the control group (P < 0.01). AUMTF determined from both the techniques demonstrated significant correlations with nuclear opacities, higher-order aberrations (HOAs), visual acuity, and contrast sensitivity functions, while the OQAS-derived AUMTF also demonstrated significant correlations with age and cortical opacity grade. The factors significantly affecting the difference between iTrace and OQAS AUMTF were root-mean-squared HOAs (standardized beta coefficient = -0.63, P < 0.01) and age (standardized beta coefficient = 0.26, P < 0.01). CONCLUSIONS: MTFs determined from a iTrace and a DP system (OQAS) differ significantly in early cataractous and normal subjects. Correlations with visual performance were higher for the DP system. OQAS-derived MTF may be useful as an indicator of visual performance in early cataract eyes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Under the Alien Tort Statute United States of America (“America”) Federal Courts have the jurisdiction to hear claims for civil wrongs, committed against non-American citizens, which were perpetrated outside America’s national borders. The operation of this law has confronted American Federal Courts with difficulties on how to manage conflicts between American executive foreign policy and judicial interpretations of international law. Courts began to pass judgment over conduct which was approved by foreign governments. Then in 2005 the American Supreme Court wound back the scope of the Alien Tort Statute. This article will review the problems with the expansion of the Alien Tort Statute and the reasons for its subsequent narrowing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Toll plazas are particularly susceptible to build-ups of vehicle-emitted pollutants because vehicles pass through in low gear. To look at this, three-dimensional computational fluid dynamics simulations of pollutant dispersion are used on the standard k e turbulence model. The effects of wind speed, wind direction and topography on pollutant dispersion were discussed. The Wuzhuang toll plaza on the Hefei-Nanjing expressway is considered, and the effects of the retaining walls along both sides of the plaza on pollutant dispersion is analysed. There are greater pollutant concentrations near the tollbooths as the angle between the direction of the wind and traffic increases implying that retaining walls impede dispersion. The slope of the walls has little influence on the variations in pollutant concentration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article was written in 1997. After a 2009 review the content was left mostly unchanged - apart from this re-written abstract, restructured headings and a table of contents. The article deals directly with professional registration of surveyors; but it also relates to government procurement of professional services. The issues include public service and professional ethics; setting of professional fees; quality assurance; official corruption; and professional recruitment, education and training. Debate on the Land Surveyors Act 1908 (Qld) and its amendments to 1916 occurred at a time when industrial unrest of the 1890s and common market principles of the new Commonwealth were fresh in peoples’ minds. Industrial issues led to a constitutional crisis in the Queensland’s then bicameral legislature and frustrated a first attempt to pass a Surveyors Bill in 1907. The Bill was re-introduced in 1908 after fresh elections and Kidston’s return as state premier. Co-ordinated immigration and land settlement polices of the colonies were discontinued when the Commonwealth gained power over immigration in 1901. Concerns shifted to protecting jobs from foreign competition. Debate on 1974 amendments to the Act reflected concerns about skill shortages and professional accreditation. However, in times of economic downturn, a so-called ‘chronic shortage of surveyors’ could rapidly degenerate into oversupply and unemployment. Theorists championed a naïve ‘capture theory’ where the professions captured governments to create legislative barriers to entry to the professions. Supposedly, this allowed rent-seeking and monopoly profits through lack of competition. However, historical evidence suggests that governments have been capable of capturing and exploiting surveyors. More enlightened institutional arrangements are needed if the community is to receive benefits commensurate with sizable co-investments of public and private resources in developing human capital.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Web 1.0 referred to the early, read-only internet; Web 2.0 refers to the ‘read-write web’ in which users actively contribute to as well as consume online content; Web 3.0 is now being used to refer to the convergence of mobile and Web 2.0 technologies and applications. One of the most important developments in mobile 3.0 is geography: with many mobile phones now equipped with GPS, mobiles promise to “bring the internet down to earth” through geographically-aware, or locative media. The internet was earlier heralded as “the death of geography” with predictions that with anyone able to access information from anywhere, geography would no longer matter. But mobiles are disproving this. GPS allows the location of the user to be pinpointed, and the mobile internet allows the user to access locally-relevant information, or to upload content which is geotagged to the specific location. It also allows locally-specific content to be sent to the user when the user enters a specific space. Location-based services are one of the fastest-growing segments of the mobile internet market: the 2008 AIMIA report indicates that user access of local maps increased by 347% over the previous 12 months, and restaurant guides/reviews increased by 174%. The central tenet of cultural geography is that places are culturally-constructed, comprised of the physical space itself, culturally-inflected perceptions of that space, and people’s experiences of the space (LeFebvre 1991). This paper takes a cultural geographical approach to locative media, anatomising the various spaces which have emerged through locative media, or “the geoweb” (Lake 2004). The geoweb is such a new concept that to date, critical discourse has treated it as a somewhat homogenous spatial formation. In order to counter this, and in order to demonstrate the dynamic complexity of the emerging spaces of the geoweb, the paper provides a topography of different types of locative media space: including the personal/aesthetic in which individual users geotag specific physical sites with their own content and meanings; the commercial, like the billboards which speak to individuals as they pass in Minority Report; and the social, in which one’s location is defined by the proximity of friends rather than by geography.