970 resultados para Network Governance
Resumo:
From the perspective of network, a project team’s social capital consists of conduits network, and resource exchange network. Prior research intensively studies the effect of the structure of conduits network on the team’s performance, assuming knowledge transfer is the causal mechanism linking conduits network to performance. This paper attempts to explore the interrelations between conduits network and knowledge network, and further distinguish the different influence between various conduit networks, and hypothesizes that a project team’s knowledge network mediates the effect of various conduit networks on the team’s performance. This research can enrich our knowledge of disparate influence of the various conduit networks on knowledge transfer, and imply some management practices to enhance the organization’s social capital, and hence improve the organization’s performance.
Resumo:
With the rise of ubiquitous computing in recent years, concepts of spatiality have become a significant topic of discussion in design and development of multimedia systems. This article investigates spatial practices at the intersection of youth, technology, and urban space in Seoul, and examines what the author calls ‘transyouth’: in the South Korean context, these people are between the ages of 18 and 24, situated on the delicate border between digital natives and immigrants in Prensky’s (2001) terms. In the first section, the article sets out the technosocial environment of contemporary Seoul. This is followed by a discussion of social networking processes derived from semi-structured interviews conducted in 2007-8 with Seoul transyouth about their ‘lived experiences of the city.’ Interviewees reported how they interact to play, work, and live with and within the city’s unique environment. The article develops a theme of how technosocial convergence (re)creates urban environments and argues for a need to consider such user-driven spatial recreation in designing cities as (ubiquitous) urban networks in recognition of its changing technosocial contours of connections. This is explored in three spaces of different scales: Cyworld as an online social networking space; cocoon housing – a form of individual residential space which is growing rapidly in many Korean cities – as a private living space; and u-City (ubiquitous City) as the future macro-space of Seoul.
Resumo:
Schools, homes and communities are increasingly perceived as risky spaces for children. This concern is a driving force behind many forms of governance imposed upon Australian children by well-meaning adults. Children are more and more the subjects of both overt and covert regulation by teachers and other adults in school contexts. Are children, though, passive in this process of governance? It is this issue that is the focus of this paper. In order to respond to the question of how young children enact governance in their everyday lives, video-recorded episodes of naturally occurring interactions among children in a preparatory classroom were captured. These data were then transcribed and analysed using the methods of conversation analysis and membership categorisation analysis. This paper shows a number of strategies that the children used when enacting governance within their peer cultures in the classroom. It focuses specifically on how adult and child-formulated rules and social orders of the classroom were drawn upon and developed in order to control and govern during the interaction. This paper illustrates that children are not passive in enacting governance, but actively and competently enact governance through their peer cultures. These findings are significant for educators to consider, as they help to develop an understanding of the complex social orders that children are continually constructing in the early childhood classroom.
Resumo:
Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.
Resumo:
Network RTK (Real-Time Kinematic) is a technology that is based on GPS (Global Positioning System) or more generally on GNSS (Global Navigation Satellite System) measurements to achieve centimeter-level accuracy positioning in real-time. Reference station placement is an important problem in the design and deployment of network RTK systems as it directly affects the quality of the positioning service and the cost of the network RTK systems. This paper identifies a new reference station placement for network RTK, namely QoS-aware regional network RTK reference station placement problem, and proposes an algorithm for the new reference station placement problem. The algorithm can always produce a reference station placement solution that completely covers the region of network RTK.
Resumo:
The distribution network reliability can be increased if distributed generators (DGs) are allowed to operate in both grid-connected and islanded operations when the network has a high DG penetration level. However, the current utility regulations do not allow for the islanded operation. The arc faults are the one of the major issues preventing the islanded operation, since the arc will not extinguish if the DGs are not disconnected. In this paper, the effect of a converter interfaced DG on an arc fault is investigated by considering different control strategies for the converter. The foldback current control characteristic is proposed to a converter interfaced DG to achieve quick arc extinction and self-restoration without disconnecting the DG in the event of an arc fault. The results are validated through PSCAD/EMTDC simulations.
Resumo:
Read through a focus on the remediation of personal photography in the Flickr photosharing website, in this essay I treat vernacular creativity as a field of cultural practice; one that that does not operate inside the institutions or cultural value systems of high culture or the commercial popular media, and yet draws on and is periodically appropriated by these other systems in dynamic and productive ways. Because of its porosity to commercial culture and art practice, this conceptual model of ‘vernacular creativity’ implies a historicised account of ‘ordinary’ or everyday creative practice that accounts for both continuity and change and avoids creating a nostalgic desire for the recuperation of an authentic folk culture. Moving beyond individual creative practice, the essay concludes by considering the unintended consequences of vernacular creativity practiced in online social networks: in particular, the idea of cultural citizenship.
Resumo:
Real-Time Kinematic (RTK) positioning is a technique used to provide precise positioning services at centimetre accuracy level in the context of Global Navigation Satellite Systems (GNSS). While a Network-based RTK (N-RTK) system involves multiple continuously operating reference stations (CORS), the simplest form of a NRTK system is a single-base RTK. In Australia there are several NRTK services operating in different states and over 1000 single-base RTK systems to support precise positioning applications for surveying, mining, agriculture, and civil construction in regional areas. Additionally, future generation GNSS constellations, including modernised GPS, Galileo, GLONASS, and Compass, with multiple frequencies have been either developed or will become fully operational in the next decade. A trend of future development of RTK systems is to make use of various isolated operating network and single-base RTK systems and multiple GNSS constellations for extended service coverage and improved performance. Several computational challenges have been identified for future NRTK services including: • Multiple GNSS constellations and multiple frequencies • Large scale, wide area NRTK services with a network of networks • Complex computation algorithms and processes • Greater part of positioning processes shifting from user end to network centre with the ability to cope with hundreds of simultaneous users’ requests (reverse RTK) There are two major requirements for NRTK data processing based on the four challenges faced by future NRTK systems, expandable computing power and scalable data sharing/transferring capability. This research explores new approaches to address these future NRTK challenges and requirements using the Grid Computing facility, in particular for large data processing burdens and complex computation algorithms. A Grid Computing based NRTK framework is proposed in this research, which is a layered framework consisting of: 1) Client layer with the form of Grid portal; 2) Service layer; 3) Execution layer. The user’s request is passed through these layers, and scheduled to different Grid nodes in the network infrastructure. A proof-of-concept demonstration for the proposed framework is performed in a five-node Grid environment at QUT and also Grid Australia. The Networked Transport of RTCM via Internet Protocol (Ntrip) open source software is adopted to download real-time RTCM data from multiple reference stations through the Internet, followed by job scheduling and simplified RTK computing. The system performance has been analysed and the results have preliminarily demonstrated the concepts and functionality of the new NRTK framework based on Grid Computing, whilst some aspects of the performance of the system are yet to be improved in future work.
Resumo:
The most frequently told story charting the rise of mass schooling should be fairly familiar to most of us. This story normally centres around the post-enlightenment social changes of the late 18th and early 19th centuries, and details how society slowly became more caring and more humane, and how we all decided that rather than simply being fodder for the mills, all children – including those from the working-classes - had the right to an education. The more civilised we became, the more we pushed back the school leaving age, until we eventually developed schools which clearly reflected the values and ambitions of the wider community. After all, are school not simply microcosms of society at large? In addition to this, the form that modern schooling takes is regarded as an unproblematic part of the same story. Of course we should organise our learning in the way we do, with the emphasis on formalised learning spaces, graded curricula, timetables of activities, various forms of assessment, and a clear hierarchy of authority. These features of the contemporary education merely reflect the fact that this is self-evidently the best system available. After all, how else could education possibly be organised?
Resumo:
Rather than passing judgment of the content of young women’s magazines, it will be argued instead that such texts actually exist as manuals of self-formation, manuals which enroll young women to do specific kinds of work on themselves. In doing so, they form an effective link between the governmental imperatives aimed at constructing particular personas – such as the sexually responsible young girl - and the actual practices whereby these imperatives are operationalised.
Resumo:
The essays in this book catalogue a wide and varied range of instances where 'things go wrong' in the practice of criminal justice. The contributions document instances where laws, policies and practices have produced unintended consequences of the most deleterious kind, drawing attention to 'boot camps', detention centres and specific penal policies such as 'short, sharp shock' and 'three strikes and you're out'. Also examined are policing practices such as 'zero tolerance', 'saturation policing' and punitive laws in the area of drug use, sex offences, and prostitution. It will be demonstrated that in each of these cases, the objectives of government resulted in the creation of new and unforeseen problems requiring further reform to the justice system.
Resumo:
The category of the `at-risk youth' currently underpins a good deal of youth policy, and in particular, education policy. Primarily, the category is centred around a range of programmes associated with the need for state intervention, intervention which largely occurs `at a distance' within domains such as the school and the family. While it is argued that in some ways, the `at-risk youth' simply replaces older characterisations used in the policing of the young, it will also be argued that the preventative policies associated with `risk' are constituted in terms of factors rather than individuals; that prevention is no longer primarily based upon personal expertise, but rather upon the gathering and collation of statistical knowledge which identifies `risks' within given populations; and that `risk' permits a greater number of young people to be brought into the field of regulatory strategies. Importantly, the category of the `at-risk youth' underpins crucial sections of policy documents such as the Finn Report (into credentialling/ education and vocational competency). In this case, youth is deemed to be `at-risk' of not making the transition to adulthood successfully. It will be argued that not only is the Finn Report significant in the administrative and cultural shaping of the category of `youth', but also by employing the notion of `risk', the Report puts in place yet another element of an effective network of governmental intelligibility covering the young. Finally, it will be argued that young women, as a specific example of a `risk' group (vis-a-vis obtaining certain types of employment), require particular forms of intervention, primarily through changing the vocational aspirations of their parents.
Resumo:
Focusing on the notion of street kids, the paper suggests that youth be viewed in an alternative way to the subculture theory associated with the Center for Contemporary Cultural Studies in Birmingham (CCCS). It is argued that not only is subculture theory an unsuitable mechanism for understanding homeless youth but also, and more importantly, is itself fundamentally problematic. It is suggested that the work of Michel Foucault necessitates a reevaluation of the domain assumptions underlying subculture theory and offers in its place a model that relocates street kids, and youth itself, as artifacts of a network of governmental strategies.
Resumo:
The category of the `at-risk' youth currently underpins a good deal of youth policy. Primarily, it centres around a range of programs associated with the need for state intervention. The `at-risk' youth tenuously appears at the intersection of a variety of knowledges/problematisations, such as vocational guidance, youth welfare, family management, and so on. Whilst it is argued that in some ways, the `at-risk' youth simply replaces older characterisations used in the policing of the young, it will also be argued that the preventative policies associated with `risk' are constituted in terms of factors rather than individuals, that prevention is no longer primarily based upon personal expertise, but rather upon the gathering and collation of statistical knowledge which identifies `risks' within given populations, and that `risk' legitimates unlimited governmental intervention. Importantly, the category of the `at-risk' youth underpins crucial sections of policy documents such as the Finn Report (into credentialling/education and vocational competency). In this case, youth is deemed to be `at-risk' of not making the transition to adulthood successfully. It will be argued that not only is the Finn Report significant in the administrative and cultural shaping of the category of `youth', but also by employing the notion of `risk', the Report puts in place yet another element of an effective network of governmental intelligibility covering the young. Finally, it will be argued that young women, as a specific an example of a `risk' group (vis-a-vis obtaining certain types of employment), require particular forms of intervention, primarily through changing the vocational aspirations of their parents.
Resumo:
This paper presents a model to estimate travel time using cumulative plots. Three different cases considered are i) case-Det, for only detector data; ii) case-DetSig, for detector data and signal controller data and iii) case-DetSigSFR: for detector data, signal controller data and saturation flow rate. The performance of the model for different detection intervals is evaluated. It is observed that detection interval is not critical if signal timings are available. Comparable accuracy can be obtained from larger detection interval with signal timings or from shorter detection interval without signal timings. The performance for case-DetSig and for case-DetSigSFR is consistent with accuracy generally more than 95% whereas, case-Det is highly sensitive to the signal phases in the detection interval and its performance is uncertain if detection interval is integral multiple of signal cycles.