35 resultados para hunting

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the optimal size of a pay-as-you-go social security program for an economy composed of both permanent-income and hand-to-mouth consumers. While previous work on this topic is framed within a two-period partial equilibrium setup, we study this issue in a life-cycle general equilibrium model. Because this type of welfare analysis depends critically on unobservable preference parameters, we methodically consider all parameterizations of the unobservables that are both feasible and reasonable—all parameterizations that can mimic key features of macro data (feasible) while still being consistent with micro evidence and convention (reasonable). The baseline model predicts that the optimal tax rate is between 6 percent and 15 percent of wage income.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with multi-robot hunting in dynamic environments. A BCSLA approach is proposed to allow mobile robots to capture an intelligent evader. During the process of hunting, four states including dispersion-random-search, surrounding, catch and prediction are employed. In order to ensure each robot appropriate movement in each state, a series of strategies are developed in this paper. The dispersion-search strategy enables the robots to find the evader effectively. The leader-adjusting strategy aims to improve the hunting robots’ response to environmental changes and the outflank strategy is proposed for the hunting robots to force the evader to enter a besieging circle. The catch strategy is designed for shrinking the besieging circle to catch the evader. The predict strategy allows the robots to predict the evader’s position when they lose the tracking information about the evader. A novel collision-free motion strategy is also presented in this paper, which is called the direction-optimization strategy. To test the effect of cooperative hunting, the target to be captured owns a safety-motion strategy, which helps it to escape being captured. The computer simulations support the rationality of the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this essay I argue that to understand Plato's philosophy, we must understand why Plato presented this philosophy as dialogues: namely, works of literature. Plato's writing of philosophy corresponds to his understanding of philosophy as a transformative way of life, which must nevertheless present itself politically, to different types of people. As a model, I examine Lacan's famous reading of Plato's Symposium in his seminar of transference love in psychoanalysis. Unlike many other readings, Lacan focuses on Alcibiades' famous description of what caused his desire for Socrates: the supposition that beneath Socrates' Silenus-like language and appearance, there were agalmata, treasures, hidden in his belly. I argue that this image of Socrates can also stand as an image for how we ought to read and to teach Plato's philosophy: as harbouring different levels of insight, couched in Plato's philosophy as literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a distributed control approach called local interactions with local coordinate systems (LILCS)to multirobot hunting tasks in unknown environments, where a team of mobile robots hunts a target called evader, which will actively try to escape with a safety strategy. This robust approach can cope with accumulative errors of wheels and imperfect communication networks. Computer simulations show the validity of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a world that is increasingly dominated by the Internet, there is a growing demand for low cost access at the users convenience. The expansion of wireless Internet networks, in particular unsecured wireless Internet networks, gives rise to novel challenges for the regulation of Internet access. The ability to access unsecured wireless Internet networks with ease and with very little impact upon the owner of the network suggests that such 'piggybacking' may be criminal behaviour or may amount to an actionable civil wrong. This paper will explore the legal ramifications of piggybacking an unsecured wireless network with knowledge that there is no entitlement to the use of the network and will consider what Australian authorities should do about this situation. This paper will look at the position in Australia and juxtapose this with that of the United Kingdom and the United States of America. In both the United Kingdom and the United States of America prosecutions have taken place of individuals who knowingly accessed unsecured wireless
networks for their own personal use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this essay I argue that to understand Plato's philosophy, we must understand why Plato presented this philosophy as dialogues: namely, works of literature. Plato's writing of philosophy corresponds to his understanding of philosophy as a transformative way of life, which must nevertheless present itself politically, to different types of people. As a model, I examine Lacan's famous reading of Plato's Symposium in his seminar of transference love in psychoanalysis. Unlike many other readings, Lacan focuses on Alcibiades' famous description of what caused his desire for Socrates: the supposition that beneath Socrates' Silenus-like language and appearance, there were agalmata, treasures, hidden in his belly. I argue that this image of Socrates can also stand as an image for how we ought to read and to teach Plato's philosophy: as harbouring different levels of insight, couched in Plato's philosophy as literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Worms and other forms of malware have been considered by IT Security firms and large companies for many years as one of the leading threats to the integrity of their data and security. However, several researchers over recent years have been working on creating worms which, instead of causing harm to machines which they infect, or the networks on which the machines reside, actually aid the network and systems administrators. Several uses of these worms have been proposed by these researchers, including, but not limited to, rapid remote patching of machines, network and system administration through use of their unique discovery and propagation methods, actively hunting, and defending against, other forms of malware such as "malevolent" worms, viruses, spyware, as well as increasing reliable communication of nodes in distributed computing. However, there has been no hint of commercial adoption of these worms, which one researcher has described as being due to a fear factor'. This paper concentrates on assessing and delivering the findings of user attitudes towards these worms in an attempt to find out how users feel about these worms, and to try and define and overcome the factors which might contribute to the fear factor'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An exploration of the revolutionary period of prehistory that began when humans abandoned the nomadic hunting and gathering existence they had known for millennia to take up a completely new way of life the decisive move to farming and herding the ration of permanent settlements and the discovery of metals setting the stage for the arrival of the worldʼs first civilisation. Stores from the Stone Age ask some intriguing questions. Why did some of our ancestors never become farmers at all? Why do some still continue hunting and gathering despite their contact with farming people and advanced technologies? How and why did our paths become uniquely shaped after emerging as a species from a single genetic family in Africa? Based on extensive research, Stories from the Stone Age takes us on a journey where we get to live alongside our ancestors as they cross between the Old and the New Worlds and into Civilisation. The series utilises detailed re-enactments and short interviews with key archaeological experts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conspicuous warning signals of unprofitable prey are a defense against visually hunting predators. They work because predators learn to associate unprofitability with bright coloration and because strong signals are detectable and memorable. However, many species that can be considered defended are not very conspicuous; they have weak warning signals. This phenomenon has previously been ignored in models and experiments. In addition, there is significant within- and among-species variation among predators in their search behavior, in their visual, cognitive, and learning abilities, and in their resistance to defenses. In this article we explore the effects of variable predators on models that combine positive frequency-dependent, frequency-independent, and negative frequency-dependent predation and show that weak signaling of aposematic species can evolve if predators vary in their tendency to attack defended prey.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Find every Chance-related Progression Point, in Level-order, from Prep to Year 10. Translate each Progression Point into a pencil-and-paper task. This makes a developmentally or progressively graded worksheet-like ''diagnostic profile' for assessing knowledge of and skills with Chance. It is diagnostic because it starts with easy, early questions, and progressively gets harder and harder as the concepts and skills in the Chance curriculum develop. Presenting this diagnostic profile to students at the beginning of a unit of work on Chance gives invaluable formative assessment information to guide your teaching. Using the same profile, or a parrallel version at the end of the unit provides before-and-after summative assessment of the students' learning during the unit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A case study of the Job Club Program for unemployed people, as it was run in a single location in Victoria, Australia. Documents and describes the views of those involved and explores their perceptions of the successes and failures of the program.