998 resultados para Benefit-Sharing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building distributed leadership for effective supervision of creative practice higher research degrees is an Office for Learning and Teaching (OLT) funded project, conducted in partnership between Queensland University of Technology, The University of Melbourne, Auckland University of Technology, University of New South Wales and University of Western Sydney. The project was initiated to develop a cooperative approach to establishing an understanding of the contextual frameworks of the emergent field of creative practice higher degrees by research (HDRs); capturing early insights of administrators and supervisors; gathering exemplars of good practices; and establishing an in-common understanding of effective approaches to supervision. To this end, the project has produced: • A literature review, to provide a research foundation for creative practice higher research degree supervision (Chapter 3). • A contextual review of disciplinary frameworks for HDR programs, produced through surveys of postgraduate research administrators (Section 4.1), and an analysis of institutional materials and academic development programs for supervisors (Section 4.2). • A National Symposium, Effective Supervision of Creative Arts Research Degrees (ESCARD), at QUT in Brisbane in February 2013, with 62 delegates from 20 Australasian Universities, at which project findings were disseminated, and delegates presented case studies and position papers, and participated in discussions on key issues for supervisors (Appendix 1). • Resources, including a booklet for supervisors: 12 Principles for the Effective Supervision of Creative Practice Higher Research Degrees, which encapsulates attitudes, insights and good practices of experienced and new supervisors. It was produced through a content analysis of interviews with twenty-five supervisors in creative disciplines (visual and performing arts, music, new media, creative writing and design) (Printed booklet, PDF, Appendix 3). • A project website to disseminate project outcomes , which holds project findings, relevant references, and a repository of case studies and position papers by supervisors and program administrators. • A call for papers for a special issue ‘Supervising Practice: Perspectives on the Supervision of Creative Practice Research Higher Degrees’ of ACCESS Journal: Critical Perspectives on Communication, Cultural & Policy Studies (ERA ranked A quality) in 2014 (Appendix 2). • A community of supervisory practice initiated through project partnerships, a national symposium where supervisors from across Australasia met in dialogue for the first time, resource sharing, and joint publishing opportunities. • A set of recommendations for supervision capacity building and academic development, produced through the triangulation of literature and contextual reviews, analysis of institutional frameworks, interviews with supervisors and national dialogues. It is anticipated that the project’s outcomes will support experienced and new supervisors in this emergent field, and so benefit HDR students, and will enable creative disciplines to build supervision capacity, and so to accommodate growth in postgraduate enrolments. Funded as a pilot project, the project set out to establish a robust research base to provide a foundation for future work involving sharing good practices, resource building, and designing effective approaches to academic development for supervisors. Recommendations that were produced out of this project include the need to extend beyond generic, formal training for supervisors to academic development that harnesses and extends distributed leadership; focuses on local, disciplinary contexts; has a strong emphasis on case studies; provides diverse resources; and facilitates dialogue between supervisors. Recommendations also include developing frameworks for mentoring new supervisors and building a national network to facilitate cross-institutional discourse, disseminate good practices, and share insights into the management of risk factors, ethical issues, and preparing candidates for examination. As a pilot investigation, the outcomes of this project lay the ground for this future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Lady Elliot Island eco-resort, on the Great Barrier Reef, operates with a strong sustainability ethic, and has broken away from its reliance on diesel generators, an initiative which has ongoing and substantial economic benefit. The first step was an energy audit that led to a 35% reduction in energy usage, to an average of 575 kWh per day. The eco-resort then commissioned a hybrid solar power station, in 2008, with energy storage in battery banks. Solar power is currently (2013) providing about 160 kWh of energy per day, and the eco-resort’s diesel fuel usage has decreased from 550 to 100 litres per day, enabling the power station to pay for itself in 3 years. The eco-resort plans to complete its transition to renewable energy by 2015, by installing additional solar panels, and a 10-15 kW wind turbine. This paper starts by discussing why the eco-resort chose a hybrid solar power station to transition to renewable energy, and the barriers to change. It then describes the power station, upgrades through to 2013, the power control system, the problems that were solved to realise the potential of a facility operating in a harsh and remote environment, and its performance. The paper concludes by outlining other eco-resort sustainability practices, including education and knowledge-sharing initiatives, and monitoring the island’s environmental and ecological condition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In today’s NHS culture, commissioners are increasingly looking to the third sector for innovation and excellence in healthcare delivery. Opportunities for organisations within this sector to form fruitful and lasting partnerships have also grown.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A number of recent developments in the United State (US), United Kingdom (UK) and Australia suggest that conditions may be ripe for a political shift in the reliance on escalating rates of imprisonment as a default criminal justice strategy for responding to crime. The default position is illustrated by the Yabsleyite response of former New South Wales (NSW) Premier Nathan Rees’s to questioning over the cost of prison building and NSW’s high recidivism rate: ‘[t]he advice to me is we have still got 500 cells empty, I don't mind if we fill them up, and if we fill them up and have to build another jail, we'll build another jail’ (Knox and Tadros 2008)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A microgrid may contain a large number of distributed generators (DGs). These DGs can be either inertial or non-inertial, either dispatchable or non-dispatchable. Moreover, the DGs may operate in plug and play fashion. The combination of these various types of operation makes the microgrid control a challenging task, especially when the microgrid operates in an autonomous mode. In this paper, a new control algorithm for converter interfaced (dispatchable) DG is proposed which facilitates smooth operation in a hybrid microgrid containing inertial and non-inertial DGs. The control algorithm works satisfactorily even when some of the DGs operate in plug and play mode. The proposed strategy is validated through PSCAD simulation studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2012 the New Zealand government spent $3.4 billion, or nearly $800 per person, on responses to crime via the justice system. Research shows that much of this spending does little to reduce the changes of re-offending. Relatively little money is spent on victims, the rehabilitation of offenders or to support the families of offenders. This book is based on papers presented at the Costs of Crime forum held by the Institute of Policy Studies in February 2011. It presents lessons from what is happening in Australia, Britain and the United States and focuses on how best to manage crime, respond to victims, and reduce offending in a cost-effective manner in a New Zealand context. It is clear that strategies are needed that are based on better research and a more informed approach to policy development. Such strategies must assist victims constructively while also reducing offending. Using public resources to lock as many people in our prisons as possible cannot be justified by the evidence and is fiscally unsustainable; nor does such an approach make society safer. To reduce the costs of crime we need to reinvest resources in effective strategies to build positive futures for those at risk and the communities needed to sustain them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction In a connected world youth are participating in digital content creating communities. This paper introduces a description of teens' information practices in digital content creating and sharing communities. Method The research design was a constructivist grounded theory methodology. Seventeen interviews with eleven teens were collected and observation of their digital communities occurred over a two-year period. Analysis The data were analysed iteratively to describe teens' interactions with information through open and then focused coding. Emergent categories were shared with participants to confirm conceptual categories. Focused coding provided connections between conceptual categories resulting in the theory, which was also shared with participants for feedback. Results The paper posits a substantive theory of teens' information practices as they create and share content. It highlights that teens engage in the information actions of accessing, evaluating, and using information. They experienced information in five ways: participation, information, collaboration, process, and artefact. The intersection of enacting information actions and experiences of information resulted in five information practices: learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. Conclusion This study contributes to our understanding of youth information actions, experiences, and practices. Further research into these communities might indicate what information practices are foundational to digital communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper demonstrates power management and control of DERs in an autonomous MG. The paper focuses on the control and performance of converter-interfaced DERs in voltage controlled mode. Several case studies are considered for a MG based on the different types of loads supplied by the MG (i.e. balanced three-phase, unbalanced, single-phase and harmonic loads). DERs are controlled by adjusting the voltage magnitude and angle in their converter output through droop control, in a decentralized concept. Based on this control method, DERs can successfully share the total demand of the MG in the presence of any type of loads. This includes proper total power sharing, unbalanced power sharing as well as harmonic power sharing, depending on the load types. The efficacy of the proposed power control, sharing and management among DERs in a microgrid is validated through extensive simulation studies using PSCAD/EMTDC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tacit knowledge sharing amongst physicians is known to have a significant impact on the quality of medical decisions. This thesis posits that social media can provide new opportunities for tacit knowledge sharing amongst physicians, and demonstrates this by presenting findings from a review of relevant literature and a qualitative survey conducted with physicians. Using thematic analysis, the study revealed five major themes and over twenty sub-themes as potential contributions of social media to tacit knowledge flow amongst physicians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User evaluations using paper prototypes commonly lack social context. The Group simulation technique described in this paper offers a solution to this problem. The study introduces an early-phase participatory design technique targeted for small groups. The proposed technique is used for evaluating an interface, which enables group work in photo collection creation. Three groups of four users, 12 in total, took part in a simulation session where they tested a low-fidelity design concept that included their own personal photo content from an event that their group attended together. The users’ own content was used to evoke natural experiences. Our results indicate that the technique helped users to naturally engage with the prototype in the session. The technique is suggested to be suitable for evaluating other early-phase concepts and to guide design solutions, especially with the concepts that include users’ personal content and enable content sharing.