34 resultados para name to Wielkopolska

em Queensland University of Technology - ePrints Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

A proposal has been posted on the ICTV website (2011. 001aG. N. v1. binomial_sp_names) to replace virus species names by non-Latinized binomial names consisting of the current italicized species name with the terminal word "virus" replaced by the italicized and non-capitalized genus name to which the species belongs. If implemented, the current italicized species name Measles virus, for instance, would become Measles morbillivirus while the current virus name measles virus and its abbreviation MeV would remain unchanged. The rationale for the proposed change is presented. © 2010 Springer-Verlag.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Kimberlite terminology remains problematic because both descriptive and genetic terms are mixed together in most existing terminology schemes. In addition, many terms used in existing kimberlite terminology schemes are not used in mainstream volcanology, even though kimberlite bodies are commonly the remains of kimberlite volcanic vents and edifices. We build on our own recently published approach to kimberlite facies terminology, involving a systematic progression from descriptive to genetic. The scheme can be used for both coherent kimberlite (i.e. kimberlite that was emplaced without undergoing any fragmentation processes and therefore preserving coherent igneous textures) and fragmental kimberlites. The approach involves documentation of components, textures and assessing the degree and effects of alteration on both components and original emplacement textures. This allows a purely descriptive composite component, textural and compositional petrological rock or deposit name to be constructed first, free of any biases about emplacement setting and processes. Then important facies features such as depositional structures, contact relationships and setting are assessed, leading to a composite descriptive and genetic name for the facies or rock unit that summarises key descriptive characteristics, emplacement processes and setting. Flow charts summarising the key steps in developing a progressive descriptive to genetic terminology are provided for both coherent and fragmental facies/deposits/rock units. These can be copied and used in the field, or in conjunction with field (e.g. drill core observations) and petrographic data. Because the approach depends heavily on field scale observations, characteristics and process interpretations, only the first descriptive part is appropriate where only petrographic observations are being made. Where field scale observations are available the progression from developing descriptive to interpretative terminology can be used, especially where some petrographic data also becomes available.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The significance of the proposed name of a building to buyers of units off the plan has received recent attention in Queensland and the ACT with differing results. In Gough v South Sky Investments Pty Ltd the Queensland Court of Appeal concluded that the name of the building was not an essential term of the contract and rejected a claim by a number of buyers to terminate their contracts because of the change of name from Oracle to Peppers. In contrast, Rares J in the Federal Court decision of Madison Constructions Pty Ltd v Empire Building Group (ACT) Pty Ltd considered that the name of the building in a proposed development could potentially form the basis of misleading conduct about the association of the seller with a particular development corporation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Construction projects are faced with a challenge that must not be underestimated. These projects are increasingly becoming highly competitive, more complex, and difficult to manage. They become problems that are difficult to solve using traditional approaches. Soft Systems Methodology (SSM) is a systems approach that is used for analysis and problem solving in such complex and messy situations. SSM uses “systems thinking” in a cycle of action research, learning and reflection to help understand the various perceptions that exist in the minds of the different people involved in the situation. This paper examines the benefits of applying SSM to problems of knowledge management in construction project management, especially those situations that are challenging to understand and difficult to act upon. It includes five case studies of its use in dealing with the confusing situations that incorporate human, organizational and technical aspects.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Currently, fashion quite comfortably covers the space between unique pieces and serialisation, mobilising as necessary the discourses of art or commerce; however, the question of what a fashion designer is remains open. Historically, the image of the fashion designer has been constructed within a heroic and Romantic narrative centred on the concept of designers as artists and hence authors. The recent development of the fashion industry as an image-driven industry, on the one hand, and the placement of fashion in museum contexts on the other, requires a re-thinking of the function of the designer. This paper does not set out to identify a theory that establishes a truthful answer to the position and significance of the fashion designer within the fashion system, but it proposes that an analytical and critical understanding of the fashion designer requires a contextualisation of the philosophies and institutions (including fashion magazines and fashion criticism) that support it.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Actions for wrongful life, as they have come unfortunately to be styled, encompass various types of claim. These include claims for alleged negligence after conception, those based on negligent advice or diagnosis prior to conception concerning possible effects of treatment given to the child's mother, contraception or sterilisation, or genetic disability. This distinguishes such claims from those for so called wrongful birth, which are claims by parents for the cost of raising either a healthy or a disabled child where the unplanned birth imposes costs on the parents as a result of clinical negligence. Two of the more controversial cases to have reached the High Court of Australia which are if interest to us here in the past decade are Cattanach v Melchior where the court, by a narrow majority (McHugh, Gummow, Kirby and Callinan JJ; Gleeson CJ, Hayne and Heydon dissenting) acknowledged recovery for wrongful birth. In the second joined appeals of Harriton v Stephens and Waller v James; Waller v Hoolahan the court overwhelmingly precluded a ‘wrongful life’ claim (Gleeson CJ, Gummow, Hayne, Callinan, Heydon and Crennan JJ; Kirby J dissenting). Both cases raised issues around the sanctity and value of life and the nature of harm and the assessment of damages, and this brief note affords us the opportunity to consider the way in which the ‘life as legal loss’ arguments were treated by the various judges in both cases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Product placement is a fast growing multi-billion dollar industry yet measures of its effectiveness, which influence the critical area of pricing, have been problematic. Past attempts to measure the effect of a placement, and therefore provide a basis for pricing of placements, have been confounded by the effect on consumers of multiple prior exposures of a brand name in all marketing communications. Virtual product placement offers certain advantages: as a tool to measure the effectiveness of product placements; assistance with the problem of lack of audience selectivity in traditional product placement; testing different audiences for brands and addressing a gap in the existing academic literature by focusing on the impact of product placement on recall and recognition of new brands.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the massive decline in savings arising from the Global Financial Crisis (GFC), it is timely to review superannuation fund investment and disclosure strategies in the lead-up to the crisis. Accordingly, this study examines differences among superannuation funds’ default investment options in terms of naming and framing over three years from 2005 to 2007, as presented in product disclosure statements (PDSs). The findings indicate that default options are becoming more alike regardless of their name, and consequently, members may face increasing difficulties in distinguishing between balanced and growth-named default options when comparing them across superannuation funds. Comparability is also likely to be constrained by variations in the framing of default options presented in investment option menus in PDSs. These findings highlight the need for standardisation of default option definitions and disclosures to ensure descriptive accuracy, transparency and comparability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis is a work of creative practice-led research comprising two components. The first component is a speculative thriller novel, entitled Diamond Eyes. (Contracted for publication in 2009 by Harper Collins: Voyager as the first in a trilogy, under the name AA Bell.) The second component is an exegesis exploring the notion of re-visioning a novel. Re-visioning, not to be confused with revision, refers to advance editing strategies required when the original vision of a novel changes during development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

My research investigates why nouns are learned disproportionately more frequently than other kinds of words during early language acquisition (Gentner, 1982; Gleitman, et al., 2004). This question must be considered in the context of cognitive development in general. Infants have two major streams of environmental information to make meaningful: perceptual and linguistic. Perceptual information flows in from the senses and is processed into symbolic representations by the primitive language of thought (Fodor, 1975). These symbolic representations are then linked to linguistic input to enable language comprehension and ultimately production. Yet, how exactly does perceptual information become conceptualized? Although this question is difficult, there has been progress. One way that children might have an easier job is if they have structures that simplify the data. Thus, if particular sorts of perceptual information could be separated from the mass of input, then it would be easier for children to refer to those specific things when learning words (Spelke, 1990; Pylyshyn, 2003). It would be easier still, if linguistic input was segmented in predictable ways (Gentner, 1982; Gleitman, et al., 2004) Unfortunately the frequency of patterns in lexical or grammatical input cannot explain the cross-cultural and cross-linguistic tendency to favor nouns over verbs and predicates. There are three examples of this failure: 1) a wide variety of nouns are uttered less frequently than a smaller number of verbs and yet are learnt far more easily (Gentner, 1982); 2) word order and morphological transparency offer no insight when you contrast the sentence structures and word inflections of different languages (Slobin, 1973) and 3) particular language teaching behaviors (e.g. pointing at objects and repeating names for them) have little impact on children's tendency to prefer concrete nouns in their first fifty words (Newport, et al., 1977). Although the linguistic solution appears problematic, there has been increasing evidence that the early visual system does indeed segment perceptual information in specific ways before the conscious mind begins to intervene (Pylyshyn, 2003). I argue that nouns are easier to learn because their referents directly connect with innate features of the perceptual faculty. This hypothesis stems from work done on visual indexes by Zenon Pylyshyn (2001, 2003). Pylyshyn argues that the early visual system (the architecture of the "vision module") segments perceptual data into pre-conceptual proto-objects called FINSTs. FINSTs typically correspond to physical things such as Spelke objects (Spelke, 1990). Hence, before conceptualization, visual objects are picked out by the perceptual system demonstratively, like a finger pointing indicating ‘this’ or ‘that’. I suggest that this primitive system of demonstration elaborates on Gareth Evan's (1982) theory of nonconceptual content. Nouns are learnt first because their referents attract demonstrative visual indexes. This theory also explains why infants less often name stationary objects such as plate or table, but do name things that attract the focal attention of the early visual system, i.e., small objects that move, such as ‘dog’ or ‘ball’. This view leaves open the question how blind children learn words for visible objects and why children learn category nouns (e.g. 'dog'), rather than proper nouns (e.g. 'Fido') or higher taxonomic distinctions (e.g. 'animal').

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reads Ray Lawrence's film Jindabyne (2006) in order to consider how "Australian" connotes as "immigrant" or "Indigenous" in contemporary Australia. Although the film is an adaptation of an American short story, it exploits an existing grammar of place in Australian cultural production in order to interrogate this very culture. If questions of race, gender, and class have haunted post-settlement Australia, Lawrence's film simultaneously stages these spectres and gestures towards the necessary failure of any attempt to exorcise them in a place where indigeneity is invisible. Thus, the location of Jindabyne, the town drowned in the name of progress, offers an exemplary visual metaphor for the failed project of identity formation in a place where forgetting is a survival tool.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.