320 resultados para Security Complex Theory


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A survey study of twenty-two Australian CEOs and their subordinates assessed relationships between Australian leader motives, Australian value based leader behaviour, subordinate tall poppy attitudes and subordinate commitment, effectiveness, motivation and satisfaction (CEMS). On the whole, the results showed general support for value based leadership processes. Subsequent regression analyses of the second main component of Value Based Leadership Theory, value based leader behaviour, revealed that the collectivistic, inspirational, integrity and visionary behaviour sub-scales of the construct were positively related with subordinate CEMS. Although the hypothesis that subordinate tall poppy attitudes would moderate value based leadership processes was not clearly supported, subsequent regression analyses found that subordinate tall poppy attitudes were negatively related with perceptions of value based leader behaviour and CEMS. These findings suggest complex relationships between the three constructs, and the proposed model for the Australian context is accordingly amended. Overall, the research supports the need to consider cultural-specific attitudes in management development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OctVCE is a cartesian cell CFD code produced especially for numerical simulations of shock and blast wave interactions with complex geometries, in particular, from explosions. Virtual Cell Embedding (VCE) was chosen as its cartesian cell kernel for its simplicity and sufficiency for practical engineering design problems. The code uses a finite-volume formulation of the unsteady Euler equations with a second order explicit Runge-Kutta Godonov (MUSCL) scheme. Gradients are calculated using a least-squares method with a minmod limiter. Flux solvers used are AUSM, AUSMDV and EFM. No fluid-structure coupling or chemical reactions are allowed, but gas models can be perfect gas and JWL or JWLB for the explosive products. This report also describes the code’s ‘octree’ mesh adaptive capability and point-inclusion query procedures for the VCE geometry engine. Finally, some space will also be devoted to describing code parallelization using the shared-memory OpenMP paradigm. The user manual to the code is to be found in the companion report 2007/13.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using a random sample of university students to test general strain theory (GST), this study expanded on previous tests of strain theory in two ways. First, situational anger was measured, a construct that had not been used thus far in assessments of general strain. In addition, this research examined the role of social support networks as a conditioning influence on the effects of strain and anger on intentions to commit three types of criminal behavior (serious assault, shoplifting, and driving under the influence of alcohol [DUI]). The results provided mixed support for GST. While the link between anger and crime was confirmed, the nature of that relationship in some cases ran counter to the theory. Moreover, the evidence indicated that the role of social support networks was complex, and varied as a conditioning influence on intentions to engage in criminal activities. (C) 2001 Elsevier Science Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The cyano-bridged complexes cis-[L14CoIIINCFeII(CN)5]– and cis-[L14CoIIINCFeIII(CN)5] (L14= 6-methyl-1,4,8,11-tetraazacyclotetradecan-6-amine) are prepared and characterised spectroscopically, electrochemically and structurally: Na{cis-[L14CoIIINCFeII(CN)5]}·9H2O, monoclinic space group P21/c, a= 14.758(3), b= 10.496(1), c= 19.359(3) , = 92.00(2)°, Z= 4; cis-[L14CoIIINCFeIII(CN)5]·4H2O, orthorhombic space group P212121, a= 9.492(1), b= 14.709(2), c= 18.760(3) , Z= 4. In both complexes, the pendant amine is cis to the bridging cyanide ligand. An analysis of the metal-to-metal charge transfer (MMCT) transition in these systems with Hush theory has been carried out. This has revealed that the change in the configuration of the macrocycle both decreases the redox isomer energy difference (E1/2) and increases the reorganisational energy () of the cis-[L14CoIIINCFeII(CN)5]– complex with respect to the trans-[L14CoIIINCFeII(CN)5]– complex, the result being that both isomers display an MMCT transition of similar energy. The variation in redox isomer energy differences of the configurational isomers has been related to strain energy differences by molecular mechanics analysis of the [CoL14Cl]2+/+ precursor complexes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cognitive complexity and control theory and relational complexity theory attribute developmental changes in theory of mind (TOM) to complexity. In 3 studies, 3-, 4-, and 5-year-olds performed TOM tasks (false belief, appearance-reality), less complex connections (Level 1 perspective-taking) tasks, and transformations tasks (understanding the effects of location changes and colored filters) with content similar to TOM. There were also predictor tasks at binary-relational and ternary-relational complexity levels, with different content. Consistent with complexity theories: (a) connections and transformations were easier and mastered earlier than TOM; (b) predictor tasks accounted for more than 80% of age-related variance in TOM; and (c) ternary-relational items accounted for TOM variance, before and after controlling for age and binary-relational items. Prediction did not require hierarchically structured predictor tasks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Flows of complex fluids need to be understood at both macroscopic and molecular scales, because it is the macroscopic response that controls the fluid behavior, but the molecular scale that ultimately gives rise to rheological and solid-state properties. Here the flow field of an entangled polymer melt through an extended contraction, typical of many polymer processes, is imaged optically and by small-angle neutron scattering. The dual-probe technique samples both the macroscopic stress field in the flow and the microscopic configuration of the polymer molecules at selected points. The results are compared with a recent tube model molecular theory of entangled melt flow that is able to calculate both the stress and the single-chain structure factor from first principles. The combined action of the three fundamental entangled processes of reptation, contour length fluctuation, and convective constraint release is essential to account quantitatively for the rich rheological behavior. The multiscale approach unearths a new feature: Orientation at the length scale of the entire chain decays considerably more slowly than at the smaller entanglement length.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article advances the discussion of the contentious question of links between global inequalities of power and violent responses, focussing on globalisation and non-inclusive forms of governance. Drawing on international political economy, the article criticises the nationstate-centrism in much political discourse, suggesting that both authority and security need to be reconsidered - to account for less plausible national borders and controls. It suggests that human security (including issues of development and equality) ought to replace national security as the primary focus of public policy. It draws attention to the intractability of difference, insisting that the terrorism of 2001 has complex transnational antecedents. Realist approaches to international order have become part of a problem to be overcome through further intellectual debate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The desire to know the future is as old as humanity. For the tourism industry the demand for accurate foretelling of the future course of events is a task that consumes considerable energy and is of great significance to investors. This paper examines the issue of forecasting by comparing forecasts of inbound tourism made prior to the political and economic crises that engulfed Indonesia from 1997 onwards with actual arrival figures. The paper finds that current methods of forecasting are not able to cope with unexpected crises and other disasters and that alternative methods need to be examined including scenarios, political risk and application of chaos theory. The paper outlines a framework for classifying shocks according to a scale of severity, probability, type of event, level of certainty and suggested forecasting tools for each scale of shock. (C) 2003 Elsevier Science Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mineral processing plants use two main processes; these are comminution and separation. The objective of the comminution process is to break complex particles consisting of numerous minerals into smaller simpler particles where individual particles consist primarily of only one mineral. The process in which the mineral composition distribution in particles changes due to breakage is called 'liberation'. The purpose of separation is to separate particles consisting of valuable mineral from those containing nonvaluable mineral. The energy required to break particles to fine sizes is expensive, and therefore the mineral processing engineer must design the circuit so that the breakage of liberated particles is reduced in favour of breaking composite particles. In order to effectively optimize a circuit through simulation it is necessary to predict how the mineral composition distributions change due to comminution. Such a model is called a 'liberation model for comminution'. It was generally considered that such a model should incorporate information about the ore, such as the texture. However, the relationship between the feed and product particles can be estimated using a probability method, with the probability being defined as the probability that a feed particle of a particular composition and size will form a particular product particle of a particular size and composition. The model is based on maximizing the entropy of the probability subject to mass constraints and composition constraint. Not only does this methodology allow a liberation model to be developed for binary particles, but also for particles consisting of many minerals. Results from applying the model to real plant ore are presented. A laboratory ball mill was used to break particles. The results from this experiment were used to estimate the kernel which represents the relationship between parent and progeny particles. A second feed, consisting primarily of heavy particles subsampled from the main ore was then ground through the same mill. The results from the first experiment were used to predict the product of the second experiment. The agreement between the predicted results and the actual results are very good. It is therefore recommended that more extensive validation is needed to fully evaluate the substance of the method. (C) 2003 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The data structure of an information system can significantly impact the ability of end users to efficiently and effectively retrieve the information they need. This research develops a methodology for evaluating, ex ante, the relative desirability of alternative data structures for end user queries. This research theorizes that the data structure that yields the lowest weighted average complexity for a representative sample of information requests is the most desirable data structure for end user queries. The theory was tested in an experiment that compared queries from two different relational database schemas. As theorized, end users querying the data structure associated with the less complex queries performed better Complexity was measured using three different Halstead metrics. Each of the three metrics provided excellent predictions of end user performance. This research supplies strong evidence that organizations can use complexity metrics to evaluate, ex ante, the desirability of alternate data structures. Organizations can use these evaluations to enhance the efficient and effective retrieval of information by creating data structures that minimize end user query complexity.