993 resultados para Native identity
Resumo:
Carbon dioxide (CO2), as a primary product of combustion, is a known factor affecting climate change and global warming. In Australia, CO2 emissions from biomass burning are a significant contributor to total carbon in the atmosphere and therefore, it is important to quantify the CO2 emission factors from biomass burning in order to estimate their magnitude and impact on the Australian atmosphere. This paper presents the quantification of CO2 emission factors for five common tree species found in South East Queensland forests, as well as several grasses taken from savannah lands in the Northern Territory of Australia, under controlled ‘fast burning’ and ‘slow burning’ laboratory conditions. The results showed that CO2 emission factors varied according to the type of vegetation and burning conditions, with emission factors for fast burning being 2574 ± 254 g/kg for wood, 394 ± 40 g/kg for branches and leaves, and 2181 ± 120 g/kg for grass. Under slow burning conditions, the CO2 emission factors were 218 ± 20 g/kg for wood, 392± 80 g/kg for branches and leaves, and 2027 ± 809 g/kg for grass.
Resumo:
"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.
Resumo:
We used in vivo (biological), in silico (computational structure prediction), and in vitro (model sequence folding) analyses of single-stranded DNA sequences to show that nucleic acid folding conservation is the selective principle behind a high-frequency single-nucleotide reversion observed in a three-nucleotide mutated motif of the Maize streak virus replication associated protein (Rep) gene. In silico and in vitro studies showed that the three-nucleotide mutation adversely affected Rep nucleic acid folding, and that the single-nucleotide reversion [C(601)A] restored wild-type-like folding. In vivo support came from infecting maize with mutant viruses: those with Rep genes containing nucleotide changes predicted to restore a wild-type-like fold [A(601)/G(601)] preferentially accumulated over those predicted to fold differently [C(601)/T(601)], which frequently reverted to A(601) and displaced the original population. We propose that the selection of native nucleic acid folding is an epigenetic effect, which might have broad implications in the evolution of plants and their viruses.
Resumo:
The development of the Australian Curriculum has reignited a debate about the role of Australian literature in the contexts of curricula and classrooms. A review of the mechanisms for promoting Australian literature including literary prizes, databases, surveys and texts included for study in senior English classrooms in New South Wales and Victoria provides a background for considering the purpose of Australian texts and the role of literature teachers in shaping students’ engagement with literature.
Resumo:
It is well documented that immigrants earn less than natives in the United States, and various attempts have been made to determine whether these earnings differentials reflect underlying differences in skill or ethnic discrimination in the labor market. The earnings of immigrants and ethnic minorities is an extensively studied area focusing on the economic integration of immigrants (e.g., Chiswick (1978), Lalonde and Topel (1993), Borjas (1995)). Yet, the role of occupational segregation as a mechanism for discrimination is yet to be addressed (to our knowledge). Discrimination can be effective at either of two stages in the earnings process – in the assignment of earnings to people within occupational groups (henceforth referred to as wage discrimination) or in the allocation of people to occupations (henceforth referred to as employment discrimination). While it would be premature to attribute the underlying cause to discriminatory hiring policies of employers, it would be of social-political and economic interest to investigate the possibility.
Resumo:
Because of the limited availability of donor cartilage for resurfacing defects in articular surfaces, there is tremendous interest in the in vitro bioengineering of cartilage replacements for clinical applications. However, attaining mechanical properties in engineered cartilaginous constructs that approach those of native cartilage has not been previously achieved when constructs are cultured under free-swelling conditions. One approach toward stimulating the development of constructs that are mechanically more robust is to expose them to physical environments that are similar, in certain ways, to those encountered by native cartilage. This is a strategy motivated by observations in numerous short-term experiments that certain mechanical signals are potent stimulators of cartilage metabolism. On the other hand, excess mechanical loading can have a deleterious effect on cartilage. Culture conditions that include a physical stimulation component are made possible by the use of specialized bioreactors. This chapter addresses some of the issues involved in using bioreactors as integral components of cartilage tissue engineering and in studying the physical regulation of cartilage. We first consider the generation of cartilaginous constructs in vitro. Next we describe the rationale and design of bioreactors that can impart either mechanical deformation or fluid-induced mechanical signals.
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Recently claims have been made that all universities will in coming decades merge to become just a few mega-institutions offering online degrees to the world. This assumes a degree of literacy with ICT (information and communication technology) amongst potential students, who are often regarded as 'digital natives'. Far from being digital natives, many students have considerable trouble using ICT beyond the ubiquitous Facebook. While some students are computer literate, a substantial proportion lack the skills to prosper under their own devices in an online tertiary education environment. For these students a blended learning experience is needed to develop skills to effectively interact in the virtual environment. This paper presents a case study that specifically examined the ICT capabilities of first-year university students enrolled in the School of Civil Engineering and the Built Environment at Queensland University of Technology (QUT). Empirical data are presented and curriculum strategies articulated to develop ICT skills in university undergraduates.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.