23 resultados para Geometric Function Theory

em Deakin Research Online - Australia


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Ten anionic compounds, including four acidic dyes, were used to dope polypyrrole powder. The effects of the dopants on density, optical absorption and conductivity of the polypyrroles were studied. The presence of the dopant in the conducting polymer matrix was verified by ATR-FTIR spectroscopy. Density function theory (DFT) simulation was used to understand the effect of the dopants on the solid structure, optical absorption and energy band structures. Anthraquinone-2-sulfonic acid-doped polypyrrole yielded the highest conductivity. The dye-doped polypyrrole showed an enhancement in its UV–vis optical absorption.


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper describes an investigation into the use of parametric 2D models describing the movement of edges for the determination of possible 3D shape and hence function of an object. An assumption of this research is that the camera can foveate and track particular features. It is argued that simple 2D analytic descriptions of the movement of edges can infer 3D shape while the camera is moved. This uses an advantage of foveation i.e. the problem becomes object centred. The problem of correspondence for numerous edge points is overcome by the use of a tree based representation for the competing hypotheses. Numerous hypothesis are maintained simultaneously and it does not rely on a single kinematic model which assumes constant velocity or acceleration. The numerous advantages of this strategy are described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The method by which a sentencing court understands the reasons for the commission of a criminal offence is crucial to the framing of the ultimate disposition imposed in all of the circumstances of the offence and the offender. Under Australian criminal law the insights of criminology are rarely. if ever. used in the discharge of the sentencing function. In particular, theories of crime causation evident in schools of criminological thought are not relied upon even though ostensibly such theories would appear to have a degree of relevance to the sentencing task. In this article, a short sketch of contemporary criminological theory is provided. This is followed by a survey of the use of criminological theory under Australian criminal law and what role, if any, it plays in contemporary  criminal justice administration. Finally, consideration is given as to whether or not criminological theory would be of assistance in the discharge of the  sentencing task in relation to not only understanding the reasons for the commission of the offence by the offender, but also in the determination of the appropriate sanction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper questions conventional approaches to measuring social welfare through gross domestic product (GDP). This paper is divided into two parts. The first part adopts a systems approach to development and incorporates this into the theory of social choice. The second part operationalises this approach through the development of a cost-benefit adjusted gross domestic product (CBAGDP) social welfare function, which overcomes certain limitations of this traditional measure of development. The CBAGDP is then used to estimate welfare in Thailand. This approach is justified because of its normative values and its plausible results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this study is to assess whether universities are meeting the needs of marketing students in their specific university function of providing knowledge and knowledge processes. This viewpoint is not meant to overlook the university role as a civilizing agent in a constant search for truth (McKenna 2001), but the focus for this study (based as it is in a Faculty of Business and Law) is toward graduates entering the corporate world. Therefore, graduates with suitable discipline knowledge and reasoning skills, in this context, must be able to meet the needs of the corporate marketing sector. Extending this backward to the role of the university, this study is by default seeking to establish if universities are meeting the needs of the corporate sector. A comparison is made between marketing classes using a specific technology of study called an autarchic system, and those classes not using this method. As part of this analysis the study investigates the application of self-determination theory and psychological needs satisfaction. The basic needs scale, comprising of two constructs; Control and Caring was adapted and used to evaluate students' perception of subjects using autarchic study system and those not utilising this methodology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To be useful for policy simulation in the current climate of rapid structural change, inverse demand systems must remain regular over substanstial variations in quantities. The distance function is a convenient vehicle for generating such systems. It also allows convenient imposition of prior ideas about the structure of preferences required for realistic policy work. While the distance function directly yields Hicksian inverse demand functions via the Shepard-Hanoch lemma, they are usually explicit in the unobservable level of utility (u), but lack a closed-form representation in terms of the observable variables. Note however that the unobservability of u need not hinder estimation. A simple one-dimensional numerical inversion allows the estimation of the distance function via the parameters of the implied Marshallian inverse demand functions. This paper develops the formal theory for using distance functions in this context, and reports on initial trials on the operational feasibility of the method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An essential function of derivative markets is price discovery. A model is proposed to incorporate a comprehensive dynamic interaction between price size coordinates of orders and trades. An example of application of the model and its effect on price discovery is discussed.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Describes a new theory of behaviour of risks in an information technology (IT) outsourcing exercise. A framework developed during the study allows practioners and managers to allay anxieties about managing uncertainty from risks that manifest when multiple parties interact over long periods of time in this environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It has often been argued that there exists an underlying biological basis of utility functions. Taking this line of argument a step further in this paper, we have aimed to computationally demonstrate the biological basis of the Black-Scholes functional form as applied to classical option pricing and hedging theory. The evolutionary optimality of the classical Black-Scholes function has been computationally established by means of a haploid genetic algorithm model. The objective was to minimize the dynamic hedging error for a portfolio of assets that is built to replicate the payoff from a European multi-asset option. The functional form that is seen to evolve over successive generations which best attains this optimization objective is the classical Black-Scholes function extended to a multiasset scenario.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we identify the necessary capabilities of the IT function to create agility in existing information systems. Agility is the ability to quickly sense and respond to environment perturbations. We contrast the agility perspective from a widely used industry framework with research perspectives on agility in the IS literature. We suggest Beer’s Viable System Model (VSM) is a useful meta-level theory to house agility elements from IS research literature, and apply VSM principles to identify the capabilities required of the IT function. Indeed, by means of a survey of 34 organisations, we confirm that the meta-level theory better correlates with reported agility measures than existing practice measures do on their own. From a research perspective, the incorporation of the VSM mechanism helps to explain ‘why’ the IT function is capable of creating agility. From a practical perspective of ‘how’, the findings point to a new set of capabilities of the IT function for future versions of the industry frameworks to enable agility.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research identifies how the IT function can create agility in existing information systems. Agility is the capability to quickly sense and respond to environmental perturbations. We contrasted perspectives on agility from a widely used industry framework and that of the IS research literature. Beer’s Viable System Model was a useful meta-level theory to house agility elements from IS research and it introduced cybernetic principles to identify the processes required of the IT function. Indeed, our surveys of 70 organizations confirmed that the applied theory better correlates with reported agility than does existing industry best practice.

The research conducted two quantitative surveys to test the applied theory. The first survey mailed a Likert-type questionnaire to the clients of an Australian IT consultancy. The second survey invited international members of professional interest groups to complete a web-based questionnaire. The responses from the surveys were analyzed using partial-least-squares modeling. The data analysis positively correlated the maturity of IT function processes prescribed by the VSM and the likelihood of agility in existing information systems. We claim our findings generalize to other large organizations in OECD member countries.

The research offers an agility-capability model of the IT function to explain and predict agility in existing information systems. A further contribution is to improve industry ‘best practice’ frameworks by prescribing processes of the IT function to develop in maturity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Measurements have been made of the solvation forces between mica surfaces in the even-numbered n-alkanes from hexane to hexadecane. In all cases the force law is qualitatively very similar, characterized by a decaying oscillatory function of distance, as occurs for simple isotropic liquids. The spacing between successive minima in the force does not increase with carbon number, and is comparable to the width of a linear alkane molecule rather than its length or any average diameter. This suggests that the alkanes have some tendency towards a parallel orientation near the mica surfaces. The measurements give no indication of any strong repulsive component expected from mean-field theories of higher alkanes or polymers. The results of one such theory are presented, and the reasons for its failure to match the experimental data are discussed.