19 resultados para predatory stink bug
em Queensland University of Technology - ePrints Archive
Resumo:
The institution the police force has been established to protect citizens and their property from harm and predatory opportunism. However, there have been occasions when the very people assigned to protect become part of the predatory force against society. Predatory policing occurs when the police use their powers to extort money in the form of bribes. While, the concept is receiving attention in Europe but there have not been any direct studies in Australia. To overcome this research deficit and determine the extent, if any, of predatory policing in Australia data is interrogated from four police corruption inquiries in the Australian states of Queensland, New South Wales, Victoria and Western Australia. In addition, it examines the role of the type of networks used by corrupt police officers. The synthesis and application of public corruption and network literatures to the predatory policing domain provides new and relevant insights to assist those responsible for the administration of our institutions of justice. The paper concludes with a framework, drawn from the first stage of the project, to assist in the conceptualisation and monitoring of this public problem.
Resumo:
Software development settings provide a great opportunity for CSCW researchers to study collaborative work. In this paper, we explore a specific work practice called bug reproduction that is a part of the software bug-fixing process. Bug re-production is a highly collaborative process by which software developers attempt to locally replicate the ‘environment’ within which a bug was originally encountered. Customers, who encounter bugs in their everyday use of systems, play an important role in bug reproduction as they provide useful information to developers, in the form of steps for reproduction, software screenshots, trace logs, and other ways to describe a problem. Bug reproduction, however, poses major hurdles in software maintenance as it is often challenging to replicate the contextual aspects that are at play at the customers’ end. To study the bug reproduction process from a human-centered perspective, we carried out an ethnographic study at a multinational engineering company. Using semi-structured interviews, a questionnaire and half-a-day observation of sixteen software developers working on different software maintenance projects, we studied bug reproduction. In this pa-per, we present a holistic view of bug reproduction practices from a real-world set-ting and discuss implications for designing tools to address the challenges developers face during bug reproduction.
Resumo:
“Predatory vs Quality journals,” presented by Paula Callan, Scholarly communications Librarian, QUT and Stephanie Bradbury, Research Support Coordinator, QUT. Presented 5 August via Blackboard Collaborate as part of the QULOC Research Support for Library Liaison webinar series. This work is licensed under a Creative Commons Attribution 4.0 International License
Resumo:
Bug fixing is a highly cooperative work activity where developers, testers, product managers and other stake-holders collaborate using a bug tracking system. In the context of Global Software Development (GSD), where software development is distributed across different geographical locations, we focus on understanding the role of bug trackers in supporting software bug fixing activities. We carried out a small-scale ethnographic fieldwork in a software product team distributed between Finland and India at a multinational engineering company. Using semi-structured interviews and in-situ observations of 16 bug cases, we show that the bug tracker 1) supported information needs of different stake holder, 2) established common-ground, and 3) reinforced issues related to ownership, performance and power. Consequently, we provide implications for design around these findings.
Resumo:
The complete mitochondrial genome of the tarnished plant bug, Lygus lineolaris, comprised 17,027 bp. The genome contained 13 protein coding regions, 22 tRNA genes and 2 ribosomal RNA genes. The gene arrangement corresponded to the common order found among insect mtDNAs which was considered to be the ancestral arrangement. The protein coding genes started with ATN and stopped with TAA or TAG. The nucleotide distribution was 76.0% A + T. The control region contained two repeat regions, one was 24 bp and the other was 161 bp. The Genbank accession for the complete L. lineolaris mt genome is EU401991.
Resumo:
One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuring the correctness of synthetic scenes generated by a rendering system of a 3D application, such as a computer game. Our approach builds a database of labelled point clouds representing the spatiotemporal colour distribution for the objects present in a sequence of bug-free frames. This is done by converting the position that the pixels take over time into the 3D equivalent points with associated colours. Once the space of labelled points is built, each new image produced from the same game by any rendering system can be analysed by measuring its visual inconsistency in terms of distance from the database. Objects within the scene can be relocated (manually or by the application engine); yet the algorithm is able to perform the image analysis in terms of the 3D structure and colour distribution of samples on the surface of the object. We applied our framework to the publicly available game RacingGame developed for Microsoft(R) Xna(R). Preliminary results show how this approach can be used to detect a variety of visual artifacts generated by the rendering system in a professional quality game engine.
Resumo:
Purpose - This paper seeks to examine the complex relationships between urban planning, infrastructure management, sustainable urban development, and to illustrate why there is an urgent need for local governments to develop a robust planning support system which integrates with advance urban computer modelling tools to facilitate better infrastructure management and improve knowledge sharing between the community, urban planners, engineers and decision makers. Design/methodology/approach - The methods used in this paper includes literature review and practical project case observations. Originality/value - This paper provides an insight of how the Brisbane's planning support system established by Brisbane City Council has significantly improved the effectiveness of urban planning, infrastructure management and community engagement through better knowledge management processes. Practical implications - This paper presents a practical framework for setting up a functional planning support system within local government. The integration of the Brisbane Urban Growth model, Virtual Brisbane and the Brisbane Economic Activity Monitoring (BEAM) database have proven initially successful to provide a dynamic platform to assist elected officials, planners and engineers to understand the limitations of the local environment, its urban systems and the planning implications on a city. With the Brisbane's planning support system, planners and decision makers are able to provide better planning outcomes, policy and infrastructure that adequately address the local needs and achieve sustainable spatial forms.
Resumo:
Virtual environments can provide, through digital games and online social interfaces, extremely exciting forms of interactive entertainment. Because of their capability in displaying and manipulating information in natural and intuitive ways, such environments have found extensive applications in decision support, education and training in the health and science domains amongst others. Currently, the burden of validating both the interactive functionality and visual consistency of a virtual environment content is entirely carried out by developers and play-testers. While considerable research has been conducted in assisting the design of virtual world content and mechanics, to date, only limited contributions have been made regarding the automatic testing of the underpinning graphics software and hardware. The aim of this thesis is to determine whether the correctness of the images generated by a virtual environment can be quantitatively defined, and automatically measured, in order to facilitate the validation of the content. In an attempt to provide an environment-independent definition of visual consistency, a number of classification approaches were developed. First, a novel model-based object description was proposed in order to enable reasoning about the color and geometry change of virtual entities during a play-session. From such an analysis, two view-based connectionist approaches were developed to map from geometry and color spaces to a single, environment-independent, geometric transformation space; we used such a mapping to predict the correct visualization of the scene. Finally, an appearance-based aliasing detector was developed to show how incorrectness too, can be quantified for debugging purposes. Since computer games heavily rely on the use of highly complex and interactive virtual worlds, they provide an excellent test bed against which to develop, calibrate and validate our techniques. Experiments were conducted on a game engine and other virtual worlds prototypes to determine the applicability and effectiveness of our algorithms. The results show that quantifying visual correctness in virtual scenes is a feasible enterprise, and that effective automatic bug detection can be performed through the techniques we have developed. We expect these techniques to find application in large 3D games and virtual world studios that require a scalable solution to testing their virtual world software and digital content.
Resumo:
The ninth release of the Toolbox, represents over fifteen years of development and a substantial level of maturity. This version captures a large number of changes and extensions generated over the last two years which support my new book “Robotics, Vision & Control”. The Toolbox has always provided many functions that are useful for the study and simulation of classical arm-type robotics, for example such things as kinematics, dynamics, and trajectory generation. The Toolbox is based on a very general method of representing the kinematics and dynamics of serial-link manipulators. These parameters are encapsulated in MATLAB ® objects - robot objects can be created by the user for any serial-link manipulator and a number of examples are provided for well know robots such as the Puma 560 and the Stanford arm amongst others. The Toolbox also provides functions for manipulating and converting between datatypes such as vectors, homogeneous transformations and unit-quaternions which are necessary to represent 3-dimensional position and orientation. This ninth release of the Toolbox has been significantly extended to support mobile robots. For ground robots the Toolbox includes standard path planning algorithms (bug, distance transform, D*, PRM), kinodynamic planning (RRT), localization (EKF, particle filter), map building (EKF) and simultaneous localization and mapping (EKF), and a Simulink model a of non-holonomic vehicle. The Toolbox also including a detailed Simulink model for a quadcopter flying robot.
Resumo:
Small-amount short-term lending began in 1994 in response to the initial exemption of such loans from consumer credit regulation. Growing demand for such loans now produces industry turnover of approximately $800 million each year. Regulators recognised early the need for consumer protection due to the vulnerability of borrowers and the emergence of various predatory practices. This led to reforms designed to regulate these loans, prevent particular misconduct and provide remedies against injustice. Some were enacted as part of the National Consumer Credit Protection Act 2009 (Cth), which also imposed licensing and responsible lending requirements on lenders and increased consumer access to remedies. The Government has now introduced the Consumer Credit and Corporations Amendment (Enhancements) Bill 2011 which limits the price that can be charged for credit and restricts access to small loans. This article examines the extensive reforms which have taken place in this sector, and compares these regulatory approaches with the “bright line approach” of the Enhancements Bill. The article argues that the repercussions of this step will require careful monitoring to ensure that further harm is not suffered by those least able to bear it, and that the government will also need to facilitate other, more sustainable, solutions to the problem that small loans are currently used to solve. After we wrote this article, the Report of the Parliamentary Joint Committee on Corporations and Financial Services and the Report of the Senate Economics Legislation Committee on the Enhancements Bill were released. These are referred to in a postscript.
Resumo:
Outbreaks of the coral-killing seastar Acanthaster planci are intense disturbances that can decimate coral reefs. These events consist of the emergence of large swarms of the predatory seastar that feed on reef-building corals, often leading to widespread devastation of coral populations. While cyclic occurrences of such outbreaks are reported from many tropical reefs throughout the Indo-Pacific, their causes are hotly debated, and the spatio-temporal dynamics of the outbreaks and impacts to reef communities remain unclear. Based on observations of a recent event around the island of Moorea, French Polynesia, we show that Acanthaster outbreaks are methodic, slow-paced, and diffusive biological disturbances. Acanthaster outbreaks on insular reef systems like Moorea's appear to originate from restricted areas confined to the ocean-exposed base of reefs. Elevated Acanthaster densities then progressively spread to adjacent and shallower locations by migrations of seastars in aggregative waves that eventually affect the entire reef system. The directional migration across reefs appears to be a search for prey as reef portions affected by dense seastar aggregations are rapidly depleted of living corals and subsequently left behind. Coral decline on impacted reefs occurs by the sequential consumption of species in the order of Acanthaster feeding preferences. Acanthaster outbreaks thus result in predictable alteration of the coral community structure. The outbreak we report here is among the most intense and devastating ever reported. Using a hierarchical, multi-scale approach, we also show how sessile benthic communities and resident coral-feeding fish assemblages were subsequently affected by the decline of corals. By elucidating the processes involved in an Acanthaster outbreak, our study contributes to comprehending this widespread disturbance and should thus benefit targeted management actions for coral reef ecosystems.
Resumo:
This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.
Resumo:
Since mass immigration recruitments of the post-war period, ‘othered’ immigrants to both the UK and Australia have faced ‘mainstream’ cultural expectations to assimilate, and various forms of state management of their integration. Perceived failure or refusal to integrate has historically been constructed as deviant, though in certain policy phases this tendency has been mitigated by cultural pluralism and official multiculturalism. At critical times, hegemonic racialisation of immigrant minorities has entailed their criminalisation, especially that of their young men. In the UK following the ‘Rushdie Affair’ of 1989, and in both Britain and Australia following these states’ involvement in the 1990-91 Gulf War, the ‘Muslim Other’ was increasingly targeted in cycles of racialised moral panic. This has intensified dramatically since the 9/11 terrorist attacks and the ensuing ‘War on Terror’. The young men of Muslim immigrant communities in both these nations have, over the subsequent period, been the subject of heightened popular and state Islamophobia in relation to: perceived ‘ethnic gangs’; alleged deviant, predatory masculinity including so-called ‘ethnic gang rape’; and paranoia about Islamist ‘radicalisation’ and its supposed bolstering of terrorism. In this context, the earlier, more genuinely social-democratic and egalitarian, aspects of state approaches to ‘integration’ have been supplanted, briefly glossed by a rhetoric of ‘social inclusion’, by reversion to increasingly oppressive assimilationist and socially controlling forms of integrationism. This article presents some preliminary findings from fieldwork in Greater Manchester over 2012, showing how mainly British-born Muslims of immigrant background have experienced these processes.
Resumo:
Lack of water can be the least of a farmer’s worries in times of drought. Predatory banks can be just as deadly to a farmer’s livelihood. Former Queensland farmer and grazier Lynton Freeman has become increasingly anxious about the financial tightrope being walked by Australian farmers as the record floods of 2011 have given way in only three years to savage drought. He fears for hundreds of family farmers at risk — not from lack of water, but from lack of knowledge in how to manage their businesses through the drought and keep their heads above the financial water that will threaten many before this drought breaks.