380 resultados para Significant events
em Queensland University of Technology - ePrints Archive
Resumo:
In line with developments overseas Australian clients are turning to considerations of value in project procurement. Until the 1980s the industry operated in a largely traditional manner however the extremely adversarial behaviour exhibited during towards the end of the decade led to a number of significant events and initiatives including the publication of “No Dispute”, the Gyles Royal Commission into the Building Industry, the Construction Industry Development Agency (CIDA) and the work of the Australian Procurement and Construction Council (APCC). A number of research projects in progress in the CRC for Construction Innovation (CRC CI) are focussing on the assessment of value and methodologies to support the delivery of value in the procurement and management of engineering and construction projects. This paper charts the emergence of several key drivers in the process and illustrates how they can be integrated into a comprehensive Decision Support System that balances value to stakeholders with project imperatives and incorporates a lessons learned data base which enriches the decision making process to optimise delivery method design and selection.
Resumo:
Critical road infrastructure (such as tunnels and overpasses) is of major significance to society and constitutes major components of interdependent, ‘systems and networks’. Failure in critical components of these wide area infrastructure systems can often result in cascading disturbances with secondary and tertiary impacts - some of which may become initiating sources of failure in their own right, triggering further systems failures across wider networks. Perrow1) considered the impact of our increasing use of technology in high-risk fields, analysing the implications on everyday life and argued that designers of these types of infrastructure systems cannot predict every possible failure scenario nor create perfect contingency plans for operators. Challenges exist for transport system operators in the conceptualisation and implementation of response and subsequent recovery planning for significant events. Disturbances can vary from reduced traffic flow causing traffic congestion throughout the local road network(s) and subsequent possible loss of income to businesses and industry to a major incident causing loss of life or complete loss of an asset. Many organisations and institutions, despite increasing recognition of the effects of crisis events, are not adequately prepared to manage crises2). It is argued that operators of land transport infrastructure are in a similar category of readiness given the recent instances of failures in road tunnels. These unexpected infrastructure failures, and their ultimately identified causes, suggest there is significant room for improvement. As a result, risk profiles for road transport systems are often complex due to the human behaviours and the inter-mix of technical and organisational components and the managerial coverage needed for the socio-technical components and the physical infrastructure. In this sense, the span of managerial oversight may require new approaches to asset management that combines the notion of risk and continuity management. This paper examines challenges in the planning of response and recovery practices of owner/operators of transport systems (above and below ground) in Australia covering: • Ageing or established infrastructure; and • New-build infrastructure. With reference to relevant international contexts this paper seeks to suggest options for enhancing the planning and practice for crisis response in these transport networks and as a result support the resilience of Critical Infrastructure.
Resumo:
This practice-led project is implemented in the context of rites of passage based on significant events in formative transitions of Self. It employs an intuitive methodology to examine and explore the 'Child archetype', mythos, symbolic imagination and self-narrative, through the manifestation of a visual symbolic language. The contexts, methods and processes enable empowerment, heightened awareness of personal and collective relationships, meaningful discovery and development of innovative ideas and forms. The implications for this project highlight the importance of intuition in creativity and innovation. Creative practice is a vehicle for personal and collective interconnectedness. I have discovered self-empowerment, meaningful learning and innovative forms of personal and collective communication as a way of enabling transition of a significant life event.
Resumo:
This paper considers the impossibility of erasing historical policing of LGBTIQ people. Significant events of LGBTIQ policing may appear to fade into the past and we perhaps assume they literally disappear – not discussed, not thought about, and erased from cultural memory. At times we see evidence of an almost nostalgic contemplation about LGBTIQ policing of the past embedded in the notion that we have moved beyond that point to the future, never to return to those histories. If we draw on the work of Foucault, an impossibility becomes apparent. Foucault suggests that discursive traces circulate in discourse and they emerge and re-emerge to shape future discourses. This paper ruminates on a case example, particularly the policing of the Gay and Lesbian Mardi Gras in Sydney, Australia, in 2013. We argue this case demonstrates Foucault’s understanding of discursive history in action: it shows how the remnant traces of historical LGBTIQ policing can re-emerge to profoundly shape LGBTIQ-police relations in the present. In addition to the case, we draw on qualitative data showing how ideas about historical LGBTIQ policing are rehearsed in a consistent cycle of iteration and reiteration through the musings of research participants across three different projects on LGBTIQ policing. We conclude therefore that LGBTIQ policing in the past may never be erased because moments reminiscent of historical LGBTIQ policing are always already circulating and undermining the governmental work of policing organisations in the present.
Resumo:
This research project set out to explore Unitary Authority (UA) involvement in festivals and special events across Wales. It considers the level and nature of UA involvement and investigates activity by event purpose; reasons for, and characteristics of, UA engagement; and, crucially, the extent and nature of event evaluation. The study’s aim was to begin the development of a baseline of information for further research into the growing use of festivals and special events as a strategy for local economic development in Wales. A quantitative survey approach facilitated a comprehensive snapshot of UA responses whilst also incorporating discursive elements. A telephone survey was designed and undertaken with representatives of all 22 UA departments responsible for festivals and events in Wales. The research reveals a significant level of festival and special event activity across Wales, supported primarily for its perceived socio-cultural value. However, evaluation would appear to be focused on improving processes and measuring economic outputs rather than assessing whether socio-cultural objectives are being achieved. Whilst overwhelmingly positive about efforts to improve approaches to evaluation, respondents held clear views about the complications most likely to hamper any such efforts. These responses focused upon the need for flexibility, cost effectiveness and comparability across festival and special event typologies.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Background Women change contraception as they try to conceive, space births, and limit family size. This longitudinal analysis examines contraception changes after reproductive events such as birth, miscarriage or termination among Australian women born from 1973 to 1978 to identify potential opportunities to increase the effectiveness of contraceptive information and service provision. Methods Between 1996 and 2009, 5,631 Australian women randomly sampled from the Australian universal health insurance (Medicare) database completed five self-report postal surveys. Three longitudinal logistic regression models were used to assess the associations between reproductive events (birth only, birth and miscarriage, miscarriage only, termination only, other multiple events, and no new event) and subsequent changes in contraceptive use (start using, stop using, switch method) compared with women who continued to use the same method. Results After women experienced only a birth, or a birth and a miscarriage, they were more likely to start using contraception. Women who experienced miscarriages were more likely to stop using contraception. Women who experienced terminations were more likely to switch methods. There was a significant interaction between reproductive events and time indicating more changes in contraceptive use as women reach their mid-30s. Conclusion Contraceptive use increases after the birth of a child, but decreases after miscarriage indicating the intention for family formation and spacing between children. Switching contraceptive methods after termination suggests these pregnancies were unintended and possibly due to contraceptive failure. Women’s contact with health professionals around the time of reproductive events provides an opportunity to provide contraceptive services.
Resumo:
Aims: To identify risk factors for major Adverse Events (AEs) and to develop a nomogram to predict the probability of such AEs in individual patients who have surgery for apparent early stage endometrial cancer. Methods: We used data from 753 patients who were randomized to either total laparoscopic hysterectomy or total abdominal hysterectomy in the LACE trial. Serious adverse events that prolonged hospital stay or postoperative adverse events (using common terminology criteria 3+, CTCAE V3) were considered major AEs. We analyzed pre-surgical characteristics that were associated with the risk of developing major AEs by multivariate logistic regression. We identified a parsimonious model by backward stepwise logistic regression. The six most significant or clinically important variables were included in the nomogram to predict the risk of major AEs within 6 weeks of surgery and the nomogram was internally validated. Results: Overall, 132 (17.5%) patients had at least one major AE. An open surgical approach (laparotomy), higher Charlson’s medical co-morbidities score, moderately differentiated tumours on curettings, higher baseline ECOG score, higher body mass index and low haemoglobin levels were associated with AE and were used in the nomogram. The bootstrap corrected concordance index of the nomogram was 0.63 and it showed good calibration. Conclusions: Six pre-surgical factors independently predicted the risk of major AEs. This research might form the basis to develop risk reduction strategies to minimize the risk of AEs among patients undergoing surgery for apparent early stage endometrial cancer.
Resumo:
This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines to disrupt the normal operations of a Web-service provider, resulting in significant down-time and financial losses. This thesis also develops methods to differentiate these attacks from similar-looking benign surges in web-traffic known as Flash Events (FEs). This thesis also addresses an intrinsic challenge in research associated with DDoS attacks, namely, the extreme scarcity of public domain datasets (due to legal and privacy issues) by developing techniques to realistically emulate DDoS attack and FE traffic.
Resumo:
Collisions between pedestrians and vehicles continue to be a major problem throughout the world. Pedestrians trying to cross roads and railway tracks without any caution are often highly susceptible to collisions with vehicles and trains. Continuous financial, human and other losses have prompted transport related organizations to come up with various solutions addressing this issue. However, the quest for new and significant improvements in this area is still ongoing. This work addresses this issue by building a general framework using computer vision techniques to automatically monitor pedestrian movements in such high-risk areas to enable better analysis of activity, and the creation of future alerting strategies. As a result of rapid development in the electronics and semi-conductor industry there is extensive deployment of CCTV cameras in public places to capture video footage. This footage can then be used to analyse crowd activities in those particular places. This work seeks to identify the abnormal behaviour of individuals in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM), Full-2D HMM and Spatial HMM to model the normal activities of people. The outliers of the model (i.e. those observations with insufficient likelihood) are identified as abnormal activities. Location features, flow features and optical flow textures are used as the features for the model. The proposed approaches are evaluated using the publicly available UCSD datasets, and we demonstrate improved performance using a Semi-2D Hidden Markov Model compared to other state of the art methods. Further we illustrate how our proposed methods can be applied to detect anomalous events at rail level crossings.
Resumo:
Terrorists usually target high occupancy iconic and public buildings using vehicle borne incendiary devices in order to claim a maximum number of lives and cause extensive damage to public property. While initial casualties are due to direct shock by the explosion, collapse of structural elements may extensively increase the total figure. Most of these buildings have been or are built without consideration of their vulnerability to such events. Therefore, the vulnerability and residual capacity assessment of buildings to deliberately exploded bombs is important to provide mitigation strategies to protect the buildings' occupants and the property. Explosive loads and their effects on a building have therefore attracted significant attention in the recent past. Comprehensive and economical design strategies must be developed for future construction. This research investigates the response and damage of reinforced concrete (RC) framed buildings together with their load bearing key structural components to a near field blast event. Finite element method (FEM) based analysis was used to investigate the structural framing system and components for global stability, followed by a rigorous analysis of key structural components for damage evaluation using the codes SAP2000 and LS DYNA respectively. The research involved four important areas in structural engineering. They are blast load determination, numerical modelling with FEM techniques, material performance under high strain rate and non-linear dynamic structural analysis. The response and damage of a RC framed building for different blast load scenarios were investigated. The blast influence region for a two dimensional RC frame was investigated for different load conditions and identified the critical region for each loading case. Two types of design methods are recommended for RC columns to provide superior residual capacities. They are RC columns detailing with multi-layer steel reinforcement cages and a composite columns including a central structural steel core. These are to provide post blast gravity load resisting capacity compared to typical RC column against a catastrophic collapse. Overall, this research broadens the current knowledge of blast and residual capacity analysis of RC framed structures and recommends methods to evaluate and mitigate blast impact on key elements of multi-storey buildings.
Resumo:
Background The purpose of this study was to estimate the incidence of fatal and non-fatal Low Speed Vehicle Run Over (LSVRO) events among children aged 0–15 years in Queensland, Australia, at a population level. Methods Fatal and non-fatal LSVRO events that occurred in children resident in Queensland over eleven calendar years (1999-2009) were identified using ICD codes, text description, word searches and medical notes clarification, obtained from five health related data bases across the continuum of care (pre-hospital to fatality). Data were manually linked. Population data provided by the Australian Bureau of Statistics were used to calculate crude incidence rates for fatal and non-fatal LSVRO events. Results There were 1611 LSVROs between 1999–2009 (IR = 16.87/100,000/annum). Incidence of non-fatal events (IR = 16.60/100,000/annum) was 61.5 times higher than fatal events (IR = 0.27/100,000/annum). LSVRO events were more common in boys (IR = 20.97/100,000/annum) than girls (IR = 12.55/100,000/annum), and among younger children aged 0–4 years (IR = 21.45/100000/annum; 39% or all events) than older children (5–9 years: IR = 16.47/100,000/annum; 10–15 years IR = 13.59/100,000/annum). A total of 896 (56.8%) children were admitted to hospital for 24 hours of more following an LSVRO event (IR = 9.38/100,000/annum). Total LSVROs increased from 1999 (IR = 14.79/100,000) to 2009 (IR = 18.56/100,000), but not significantly. Over the 11 year period, there was a slight (non –significant) increase in fatalities (IR = 0.37-0.42/100,000/annum); a significant decrease in admissions (IR = 12.39–5.36/100,000/annum), and significant increase in non-admissions (IR = 2.02-12.77/100,000/annum). Trends over time differed by age, gender and severity. Conclusion This is the most comprehensive, population-based epidemiological study on fatal and non-fatal LSVRO events to date. Results from this study indicate that LSVROs incur a substantial burden. Further research is required on the characteristics and risk factors associated with these events, in order to adequately inform injury prevention. Strategies are urgently required in order to prevent these events, especially among young children aged 0-4 years.
Resumo:
Purpose Dermatologic adverse events (dAEs) in cancer treatment are frequent with the use of targeted therapies. These dAEs have been shown to have significant impact on health-related quality of life (HRQoL). While standardized assessment tools have been developed for physicians to assess severity of dAEs, there is a discord between objective and subjective measures. The identification of patient-reported outcome (PRO) instruments useful in the context of targeted cancer therapies is therefore important in both the clinical and research settings for the overall evaluation of dAEs and their impact on HRQoL. Methods A comprehensive, systematic literature search of published articles was conducted by two independent reviewers in order to identify PRO instruments previously utilized in patient populations with dAEs from targeted cancer therapies. The identified PRO instruments were studied to determine which HRQoL issues relevant to dAEs were addressed, as well as the process of development and validation of these instruments. Results Thirteen articles identifying six PRO instruments met the inclusion criteria. Four instruments were general dermatology (Skindex-16©, Skindex-29©, Dermatology Life Quality Index (DLQI), and DIELH-24) and two were symptom-specific (functional assessment of cancer therapy-epidermal growth factor receptor inhibitor-18 (FACT-EGFRI-18) and hand-foot syndrome-14 (HFS-14)). Conclusions While there are several PRO instruments that have been tested in the context of targeted cancer therapy, additional work is needed to develop new instruments and to further validate the instruments identified in this study in patients receiving targeted therapies.
Resumo:
Introduction Presently, the severity of obstructive sleep apnea (OSA) is estimated based on the apnea-hypopnea index (AHI). Unfortunately, AHI does not provide information on the severity of individual obstruction events. Previously, the severity of individual obstruction events has been suggested to be related to the outcome of the disease. In this study, we incorporate this information into AHI and test whether this novel approach would aid in discriminating patients with the highest risk. We hypothesize that the introduced adjusted AHI parameter provides a valuable supplement to AHI in the diagnosis of the severity of OSA. Methods This hypothesis was tested by means of retrospective follow-up (mean ± sd follow-up time 198.2 ± 24.7 months) of 1,068 men originally referred to night polygraphy due to suspected OSA. After exclusion of the 264 patients using CPAP, the remaining 804 patients were divided into normal (AHI < 5) and OSA (AHI ≥ 5) categories based on conventional AHI and adjusted AHI. For a more detailed analysis, the patients were divided into normal, mild, moderate, and severe OSA categories based on conventional AHI and adjusted AHI. Subsequently, the mortality and cardiovascular morbidity in these groups were determined. Results Use of the severity of individual obstruction events for adjustment of AHI led to a significant rearrangement of patients between severity categories. Due to this rearrangement, the number of deceased patients diagnosed to have OSA was increased when adjusted AHI was used as the diagnostic index. Importantly, risk ratios of all-cause mortality and cardiovascular morbidity were higher in moderate and severe OSA groups formed based on the adjusted AHI parameter than in those formed based on conventional AHI. Conclusions The adjusted AHI parameter was found to give valuable supplementary information to AHI and to potentially improve the recognition of OSA patients with the highest risk of mortality or cardiovascular morbidity.