104 resultados para arbitrary sharing configurations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The musical involvement of people over the centuries is fundamentally interwoven with spiritual experiences (Seifert 2011). This paper discusses the connection between music and spirituality in an inter-denominational group in the southeastern suburbs of Melbourne. With ethical clearance, through semi-structured interviews with two church leaders and the music worship team, subsequently employing Interpretative Phenomenological Analysis (IPA), I analysed and codified the data gathered. Two overarching themes are discussed: insights into music and spirituality; and connecting music to worship with self and others. The findings show that music in worship may provide a rich pathway for people to explore, experience, and express their spirituality, and to connect to the wider multicultural society. It also adds to the current debates on whether music has spiritual significance for some people apart from community expressions of spirituality through music. Limitations of the current study are knowledged and generalizations cannot be made regarding connections to music and spirituality. However, the findings do indicate that music in worship can enrich one’s spiritual experience and connection with God and others.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interleukins 2 and 15 (IL-2 and IL-15) are highly differentiated but related cytokines with overlapping, yet also distinct functions, and established benefits for medical drug use. The present study identified a gene for an ancient third IL-2/15 family member in reptiles and mammals, interleukin 15-like (IL-15L), which hitherto was only reported in fish. IL-15L genes with intact open reading frames (ORFs) and evidence of transcription, and a recent past of purifying selection, were found for cattle, horse, sheep, pig and rabbit. In human and mouse the IL-15L ORF is incapacitated. Although deduced IL-15L proteins share only ~21 % overall amino acid identity with IL-15, they share many of the IL-15 residues important for binding to receptor chain IL-15Rα, and recombinant bovine IL-15L was shown to interact with IL-15Rα indeed. Comparison of sequence motifs indicates that capacity for binding IL-15Rα is an ancestral characteristic of the IL-2/15/15L family, in accordance with a recent study which showed that in fish both IL-2 and IL-15 can bind IL-15Rα. Evidence reveals that the species lineage leading to mammals started out with three similar cytokines IL-2, IL-15 and IL-15L, and that later in evolution (1) IL-2 and IL-2Rα receptor chain acquired a new and specific binding mode and (2) IL-15L was lost in several but not all groups of mammals. The present study forms an important step forward in understanding this potent family of cytokines, and may help to improve future strategies for their application in veterinarian and human medicine.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Humanities Networked Infrastructure (HuNI) is one of the national Virtual Laboratories that are being developed as part of the Australian government's National e-Research Collaboration Tools and Resources (NeCTAR) programme. This paper examines the methodologies and technical architecture being deployed by HuNI to link and share Australian data in the humanities and creative arts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organisational downsizing has proven a popular strategic intervention in the new globalised competitive business environment. Yet surprisingly little research has been conducted in the knowledge management domain to help scholars and managers better understand the effects of downsizing on organisational knowledge sharing. This paper reports some of the key findings from an interpretive investigation of organisational knowledge sharing in a division of large Australian organisation where downsizing had recently taken place. The findings reveal structural and cultural effects stemming from downsizing, and shows how these effects influenced knowledge sharing. The paper provides sets of knowledge-based impacts of downsizing on (1) organisational structure and (2) organisational culture at the case organisation. Important implications for knowledge management research and practice are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Managers and researchers alike have sought new ways to address the challenges of sharing dispersed knowledge in modern business environments. Careful consideration by sharers of receivers' knowledge needs and behaviours may improve the effectiveness of organisational knowledge sharing. This research examines how sharers react to their perceptions of receivers' knowledge needs and behaviours when making choices relating to sharing knowledge. The focus of this article is to propose and empirically explore a theoretical framework for a study of the role of the receiver in knowledge sharing - receiver-based theory. Data collected from two case studies highlight a key role played by perceived receiver knowledge needs and behaviours in shaping sharer choices when explicit knowledge is shared. A set of receiver influences on knowledge sharing is provided that highlights key receiver and sharer issues. The paper concludes that companies should develop better ways to connect potential sharers with receivers' real knowledge needs. Further, the findings suggest that sharing on a need-to-know basis hinders change in organisational power structures, and prevents the integration of isolated pockets of knowledge that may yield new value. © 2008, IGI Global.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a nonlinear backstepping controller is designed for three-phase grid-connected solar photovoltaic (PV) systems to share active and reactive power. A cascaded control structure is considered for the purpose of sharing appropriate amount of power. In this cascaded control structure, the dc-link voltage controller is designed for balancing the power flow within the system and the current controller is designed to shape the grid current into a pure sinusoidal waveform. In order to balance the power flow, it is always essential to maintain a constant voltage across the dc-link capacitor for which an incremental conductance (IC) method is used in this paper. This approach also ensures the operation of solar PV arrays at the maximum power point (MPP) under rapidly changing atmospheric conditions. The proposed current controller is designed to guarantee the current injection into the grid in such a way that the system operates at a power factor other than unity which is essential for sharing active and reactive power. The performance of the proposed backstepping approach is verified on a three-phase grid-connected PV system under different atmospheric conditions. Simulation results show the effectiveness of the proposed control scheme in terms of achieving desired control objectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sex roles during incubation vary dramatically in socially monogamous shorebirds. The "incubator conspicuousness" hypothesis posits that, for biparentally incubating and sexually dimorphic birds, the more conspicuous sex should incubate when visually foraging predators are inactive, and in many ecosystems this is at night. Therefore, sexually monomorphic species should share incubation equitably throughout the day and night. We examined incubation patterns in Masked Lapwings Vanellus miles and found that the contribution of the sexes to incubation was equitable. Another measure of incubation behavior, bout duration, was similar between the sexes; male bout durations were slightly shorter than for females. This finding is consistent with the predictions of the incubator conspicuousness hypothesis, although other processes may also explain equitable care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software-as-a-service (SaaS) multi-tenancy in cloud-based applications helps service providers to save cost, improve resource utilization, and reduce service customization and maintenance time. This is achieved by sharing of resources and service instances among multiple "tenants" of the cloud-hosted application. However, supporting multi-tenancy adds more complexity to SaaS applications required capabilities. Security is one of these key requirements that must be addressed when engineering multi-tenant SaaS applications. The sharing of resources among tenants - i.e. multi-tenancy - increases tenants' concerns about the security of their cloud-hosted assets. Compounding this, existing traditional security engineering approaches do not fit well with the multi-tenancy application model where tenants and their security requirements often emerge after the applications and services were first developed. The resultant applications do not usually support diverse security capabilities based on different tenants' needs, some of which may change at run-time i.e. after cloud application deployment. We introduce a novel model-driven security engineering approach for multi-tenant, cloud-hosted SaaS applications. Our approach is based on externalizing security from the underlying SaaS application, allowing both application/service and security to evolve at runtime. Multiple security sets can be enforced on the same application instance based on different tenants' security requirements. We use abstract models to capture service provider and multiple tenants' security requirements and then generate security integration and configurations at runtime. We use dependency injection and dynamic weaving via Aspect-Oriented Programming (AOP) to integrate security within critical application/service entities at runtime. We explain our approach, architecture and implementation details, discuss a usage example, and present an evaluation of our approach on a set of open source web applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The creation of sharing communities has resulted in the astonishing increasing of digital videos, and their wide applications in the domains such as entertainment, online news broadcasting etc. The improvement of these applications relies on effective solutions for social user access to video data. This fact has driven the recent research interest in social recommendation in shared communities. Although certain effort has been put into video recommendation in shared communities, the contextual information on social users has not been well exploited for effective recommendation. In this paper, we propose an approach based on the content and social information of videos for the recommendation in sharing communities. Specifically, we first exploit a robust video cuboid signature together with the Earth Mover's Distance to capture the content relevance of videos. Then, we propose to identify the social relevance of clips using the set of users belonging to a video. We fuse the content relevance and social relevance to identify the relevant videos for recommendation. Following that, we propose a novel scheme called sub-community-based approximation together with a hash-based optimization for improving the efficiency of our solution. Finally, we propose an algorithm for efficiently maintaining the social updates in dynamic shared communities. The extensive experiments are conducted to prove the high effectiveness and efficiency of our proposed video recommendation approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to re-authenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Forecasting bike sharing demand is of paramount importance for management of fleet in city level. Rapidly changing demand in this service is due to a number of factors including workday, weekend, holiday and weather condition. These nonlinear dependencies make the prediction a difficult task. This work shows that type-1 and type-2 fuzzy inference-based prediction mechanisms can capture this highly variable trend with good accuracy. Wang-Mendel rule generation method is utilized to generate rule base and then only current information like date related information and weather condition is used to forecast bike share demand at any given point in future. Simulation results reveal that fuzzy inference predictors can potentially outperform traditional feed forward neural network in terms of prediction accuracy.