996 resultados para Occurrences


Relevância:

10.00% 10.00%

Publicador:

Resumo:

PRESENTED by the Escapists, Boy Girl Wall tells the unlikely yet strangely inevitable story of the series of events by which an odd assortment of people, objects and chance occurrences conspire to bring together lonely neighbours Thomas and Alethea...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hong Kong in summer (June - October) is hot and humid. Construction workers have to undertake physically demanding activities and often in confined spaces. They are vulnerable to heat stress in summer hence health and safety measures associated to heat stress measured by scientific and clinical parameters are urgently needed. This paper provides an initial report of a research project funded by the Research Grants Council (RGC) of the HKSAR. The aim of this study is to develop a set of indices measured by clinical and scientific methods to detect impending attacks of heat stress. These indices would be of tremendous value in better safeguarding workers’ health and safety by reducing the occurrences of heat stress on site. This paper firstly reports on the statistics of construction incidents arising from heat stress. Qualitative and quantitative research methods applied in conducting the research are discussed. It is believed that the construction industry and the government would benefit a lot as a result of this study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The overall objective of this thesis is to explore how and why the content of individuals' psychological contracts changes over time. The contract is generally understood as "individual beliefs, shaped by the organisation, regarding the terms of an exchange agreement between individuals and their organisation" (Rousseau, 1995, p. 9). With an overall study sampling frame of 320 graduate organisational newcomers, a mixed method longitudinal research design comprised of three sequential, inter-related studies is employed in order to capture the change process. From the 15 semi-structured interviews conducted in Study 1, the key findings included identifying a relatively high degree of mutuality between employees' and their managers' reciprocal contract beliefs around the time of organisational entry. Also, at this time, individuals had developed specific components of their contract content through a mix of social network information (regarding broader employment expectations) and perceptions of various elements of their particular organisation's reputation (for more firm-specific expectations). Study 2 utilised a four-wave survey approach (available to the full sampling frame) over the 14 months following organisational entry to explore the 'shape' of individuals' contract change trajectories and the role of four theorised change predictors in driving these trajectories. The predictors represented an organisational-level informational cue (perceptions of corporate reputation), a dyadic-level informational cue (perceptions of manager-employee relationship quality) and two individual difference variables (affect and hardiness). Through the use of individual growth modelling, the findings showed differences in the general change patterns across contract content components of perceived employer (exhibiting generally quadratic change patterns) and employee (exhibiting generally no-change patterns) obligations. Further, individuals differentially used the predictor variables to construct beliefs about specific contract content. While both organisational- and dyadic-level cues were focused upon to construct employer obligation beliefs, organisational-level cues and individual difference variables were focused upon to construct employee obligation beliefs. Through undertaking 26 semi-structured interviews, Study 3 focused upon gaining a richer understanding of why participants' contracts changed, or otherwise, over the study period, with a particular focus upon the roles of breach and violation. Breach refers to an employee's perception that an employer obligation has not been met and violation refers to the negative and affective employee reactions which may ensue following a breach. The main contribution of these findings was identifying that subsequent to a breach or violation event a range of 'remediation effects' could be activated by employees which, depending upon their effectiveness, served to instigate either breach or contract repair or both. These effects mostly instigated broader contract repair and were generally cognitive strategies enacted by an individual to re-evaluate the breach situation and re-focus upon other positive aspects of the employment relationship. As such, the findings offered new evidence for a clear distinction between remedial effects which serve to only repair the breach (and thus the contract) and effects which only repair the contract more broadly; however, when effective, both resulted in individuals again viewing their employment relationships positively. Overall, in response to the overarching research question of this thesis, how and why individuals' psychological contract beliefs change, individuals do indeed draw upon various information sources, particularly at the organisational-level, as cues or guides in shaping their contract content. Further, the 'shapes' of the changes in beliefs about employer and employee obligations generally follow different, and not necessarily linear, trajectories over time. Finally, both breach and violation and also remedial actions, which address these occurrences either by remedying the breach itself (and thus the contract) or the contract only, play central roles in guiding individuals' contract changes to greater or lesser degrees. The findings from the thesis provide both academics and practitioners with greater insights into how employees construct their contract beliefs over time, the salient informational cues used to do this and how the effects of breach and violation can be mitigated through creating an environment which facilitates the use of effective remediation strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analytical electron microscopy on individual grains from a portion of a chondritic porous interplanetary dust particle (aggregate W7029C1 from the NASA Johnson Space Center Cosmic Dust Collection) shows that layer silicates compose 50 percent of the silicate fraction examined. These layer silicates can be classified into two distinct crystallochemical groups: (1) fine-grained, polycrystalline smectite minerals; and (2) well-ordered, single crystals of kaolinite and Mg-poor talc. The layer silicates in this portion of sample W7029(asterisk)A are dissimilar to those described in other chondritic porous aggregates. The predominant layer silicate assemblage in W7029(asterisk)A indicates that heating of the aggregate during atmospheric entry was brief and probably to a temperature less than 300C. Comparison with terrestrial phyllosilicate occurrences suggests that some layer silicates in aggregate W7029(asterisk)A may have been formed by alteratiton from preexisting silicate minerals at low temperatures (less than 25C) after aggregate formation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an innovative platform that facilitates the collection of objective safety data around occurrences at railway level crossings using data sources including forward-facing video, telemetry from trains and geo-referenced asset and survey data. This platform is being developed with support by the Australian rail industry and the Cooperative Research Centre for Rail Innovation. The paper provides a description of the underlying accident causation model, the development methodology and refinement process as well as a description of the data collection platform. The paper concludes with a brief discussion of benefits this project is expected to provide the Australian rail industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Theoretical Background and research questions/hypothesis: Recently, throughout Australasia, humorous appeals have become implemented increasingly in health advertising despite limited evidence regarding the persuasiveness of different types of humour. Of those studies available which have examined the persuasiveness of humorous messages, the type of humour is often not defined so it is unclear what type of humour is being examined. Speck’s (1991) typology includes five types of humour; comic wit, sentimental humour, satire, sentimental comedy, and full comedy. Each type of humour is based on one or more humour generation processes; namely, incongruity-resolution, disparagement humour, and arousal-safety. It has been acknowledged that more research is needed to determine the relative persuasiveness of these different types of humour and to identify those types which may be most effective for health advertising. The current research explored individuals’ thoughts about, and their responses to some different types of, humorous messages addressing the serious health topic of road safety. Methods: A preliminary qualitative, study was conducted involving discussions with licensed drivers (N = 18) regarding their thoughts and feelings about humorous road safety messages in general as well as in response to some (5 in total) pre-existing advertisements. Men (n = 10) and women of younger and older age groups (17-24 or 25+ years) participated in one of six discussions. Participants were recruited from an existing community-based database held by the authors’ Research Centre or were approached directly on the university campus. Ethical approval was gained for the study. Each participant was offered $AUD40. A semi-structured interview schedule guided the discussion (e.g., was it humorous?, would this ad influence you?). Audio-recordings of the discussions were professionally transcribed and the transcripts were analysed using thematic analysis. Results: The findings revealed that, irrespective of age and gender, humour that was clever, incorporated something unexpected and contrasting with the everyday, was a preferred and relevant approach, thus aligning with incongruity-based theories of humour generation and humour types, such as comic wit and satire. As a persuasive function, humorous messages were considered likely to be talked about (and relatively more so than traditional fear-based approaches). Participants also felt that humorous messages would need to be used cautiously as humour that was considered inappropriate and/or associated with serious occurrences, such as a crash, would be unlikely to persuade. Conclusions: The findings highlight some of the potential benefits of using humour, such as increasing the extent to which an advertisement is talked about as well as the types of humour which may be effective in this context. Implications for research and/or practice: While this research has provided important insight, future research which quantitatively assesses the persuasive effects of different types of humorous road safety messages within a larger, representative sample is needed. This current study has highlighted some humorous approaches which may hold persuasive promise in encouraging individuals to adopt safer attitudes and behaviours not only on the road, but in relation to serious health issues more broadly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Childbirth is an extraordinary, everyday experience; in 2011, 301 617 infants were born in Australia [1], resulting in countless potential occurrences of sleep disturbance and subsequent daytime sleepiness. While the relationship between sleep and sleepiness has been heavily investigated in the vulnerable sub-populations of shift workers and patients with sleep disorders, comparatively postpartum women have been overlooked. Previous research has reported slower reaction times to the Psychomotor Vigilance Task [2] and shorter sleep onset in the multiple sleep latency test [3] in new mothers compared with control women. However little is known about change in sleep and sleepiness over time or potential interactions with infant care behaviour choices, such as co-sleeping (mother and infant sharing a bed). This study aims to investigate change in new mothers sleep quantity, sleep quality and resulting daytime sleepiness over postpartum weeks 6, 12 and 18, while evaluating the impact of co-sleeping.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Outbreaks of the coral-killing seastar Acanthaster planci are intense disturbances that can decimate coral reefs. These events consist of the emergence of large swarms of the predatory seastar that feed on reef-building corals, often leading to widespread devastation of coral populations. While cyclic occurrences of such outbreaks are reported from many tropical reefs throughout the Indo-Pacific, their causes are hotly debated, and the spatio-temporal dynamics of the outbreaks and impacts to reef communities remain unclear. Based on observations of a recent event around the island of Moorea, French Polynesia, we show that Acanthaster outbreaks are methodic, slow-paced, and diffusive biological disturbances. Acanthaster outbreaks on insular reef systems like Moorea's appear to originate from restricted areas confined to the ocean-exposed base of reefs. Elevated Acanthaster densities then progressively spread to adjacent and shallower locations by migrations of seastars in aggregative waves that eventually affect the entire reef system. The directional migration across reefs appears to be a search for prey as reef portions affected by dense seastar aggregations are rapidly depleted of living corals and subsequently left behind. Coral decline on impacted reefs occurs by the sequential consumption of species in the order of Acanthaster feeding preferences. Acanthaster outbreaks thus result in predictable alteration of the coral community structure. The outbreak we report here is among the most intense and devastating ever reported. Using a hierarchical, multi-scale approach, we also show how sessile benthic communities and resident coral-feeding fish assemblages were subsequently affected by the decline of corals. By elucidating the processes involved in an Acanthaster outbreak, our study contributes to comprehending this widespread disturbance and should thus benefit targeted management actions for coral reef ecosystems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores how the amalgamated wisdom of East and West can instigate a wisdombased renaissance of humanistic epistemology (Rooney & McKenna, 2005) to provide a platform of harmony in managing knowledge-worker productivity, one of the biggest management challenges of the 21st century (Drucker, 1999). The paper invites further discussions from the social and business research communities on the significance of "interpretation realism" technique in comprehending philosophies of Lao Tzu Confucius and Sun Tzu (Lao/Confucius/Sun] written in "Classical Chinese." This paper concludes with a call to build prudent, responsible practices in management which affects the daily lives of many (Rooney & McKenna, 2005) in today's knowledgebased economy. Interpretation Realism will be applied to an analysis of three Chinese classics of Lao/Confucius/Sun which have been embodied in the Chinese culture for over 2,500 years. Comprehending Lao/Confucius/Sun's philosophies is the first step towards understanding Classical Chinese culture. However, interpreting Chinese subtlety in language and the yin and yang circular synthesis in their mode of thinking is very different to understanding Western thought with its open communication and its linear, analytical pattern of Aristotelian/Platonic wisdom (Zuo, 2012). Furthermore, Eastern ways of communication are relatively indirect and mediatory in culture. Western ways of communication are relatively direct and litigious in culture (Goh, 2002). Furthermore, Lao/Confucius/Sun's philosophies are difficult to comprehend as there are four written Chinese formats and over 250 dialects: Pre-classical Chinese Classical Chinese Literary Chinese and modern Vernacular Chinese Because Classical Chinese is poetic, comprehension requires a mixed approach of interpretation realism combining logical reasoning behind "word splitting word occurrences", "empathetic metaphor" and "poetic appreciation of word.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Basal cell carcinoma (BCC) is a skin cancer of particular importance to the Australian community. Its rate of occurrence is highest in Queensland, where 1% to 2% of people are newly affected annually. This is an order of magnitude higher than corresponding incidence estimates in European and North American populations. Individuals with a sun-sensitive complexion are particularly susceptible because sun exposure is the single most important causative agent, as shown by the anatomic distribution of BCC which is in general consistent with the levels of sun exposure across body sites. A distinguishing feature of BCC is the occurrence of multiple primary tumours within individuals, synchronously or over time, and their diagnosis and treatment costs contribute substantially to the major public health burden caused by BCC. A primary knowledge gap about BCC pathogenesis however was an understanding of the true frequency of multiple BCC occurrences and their body distribution, and why a proportion of people do develop more than one BCC in their life. This research project sought to address this gap under an overarching research aim to better understand the detailed epidemiology of BCC with the ultimate goal of reducing the burden of this skin cancer through prevention. The particular aim was to document prospectively the rate of BCC occurrence and its associations with constitutional and environmental (solar) factors, all the while paying special attention to persons affected by more than one BCC. The study built on previous findings and recent developments in the field but set out to confirm and extend these and propose more adequate theories about the complex epidemiology of this cancer. Addressing these goals required a new approach to researching basal cell carcinoma, due to the need to account for the phenomenon of multiple incident BCCs per person. This was enabled by a 20 year community-based study of skin cancer in Australians that provided the methodological foundation for this thesis. Study participants were originally randomly selected in 1986 from the electoral register of all adult residents of the subtropical township of Nambour in Queensland, Australia. On various occasions during the study, participants were fully examined by dermatologists who documented cumulative photodamage as well as skin cancers. Participants completed standard questionnaires about skin cancer-related factors, and consented to have any diagnosed skin cancers notified to the investigators by regional pathology laboratories in Queensland. These methods allowed 100% ascertainment of histologically confirmed BCCs in this study population. 1339 participants had complete follow-up to the end of 2007. Statistical analyses in this thesis were carried out using SAS and SUDAAN statistical software packages. Modelling methods, including multivariate logistic regressions, allowed for repeated measures in terms of multiple BCCs per person. This innovative approach gave new findings on two levels, presented in five chapters as scientific papers: 1. Incidence of basal cell carcinoma multiplicity and detailed anatomic distribution: longitudinal study of an Australian population The incidence of people affected multiple times by BCC was 705 per 100,000 person years compared to an incidence rate of people singly affected of 935 per 100,000 person years. Among multiply and singly affected persons alike, site-specific BCC incidence rates were far highest on facial subsites, followed by upper limbs, trunk, and then lower limbs 2. Melanocytic nevi and basal cell carcinoma: is there an association? BCC risk was significantly increased in those with forearm nevi (Odds Ratios (OR) 1.43, 95% Confidence Intervals (CI) 1.09-1.89) compared to people without forearm nevi, especially among those who spent their time mainly outdoors (OR 1.6, 95%CI 1.1-2.3) compared to those who spent their time mainly indoors. Nevi on the back were not associated with BCC. 3. Clinical signs of photodamage are associated with basal cell carcinoma multiplicity and site: a 16-year longitudinal study Over a 16-year follow-up period, 58% of people affected by BCC developed more than one BCC. Among these people 60% developed BCCs across different anatomic sites. Participants with high numbers of solar keratoses, compared to people without solar keratoses, were most likely to experience the highest BCC counts overall (OR 3.3, 95%CI 1.4-13.5). Occurrences of BCC on the trunk (OR 3.3, 95%CI 1.4-7.6) and on the limbs (OR 3.7, 95%CI 2.0-7.0) were strongly associated with high numbers of solar keratoses on these sites. 4. Occurrence and determinants of basal cell carcinoma by histological subtype in an Australian community Among 1202 BCCs, 77% had a single growth pattern and 23% were of mixed histological composition. Among all BCCs the nodular followed by the superficial growth patterns were commonest. Risk of nodular and superficial BCCs on the head was raised if 5 or more solar keratoses were present on the face (OR 1.8, 95%CI 1.2-2.7 and OR 4.5, 95%CI 2.1-9.7 respectively) and similarly on the trunk in the presence of multiple solar keratoses on the trunk (OR 4.2, 95%CI 1.5-11.9 and OR 2.2, 95%CI 1.1-4.4 respectively). 5. Basal cell carcinoma and measures of cumulative sun exposure: an Australian longitudinal community-based study Dermal elastosis was more likely to be seen adjacent to head and neck BCCs than trunk BCCs (p=0.01). Severity of dermal elastosis increased on each site with increasing clinical signs of cutaneous sun damage on that site. BCCs that occurred without perilesional elastosis per se, were always found in an anatomic region with signs of photodamage. This thesis thus has identified the magnitude of the burden of multiple BCCs. It does not support the view that people affected by more than one BCC represent a distinct group of people who are prone to BCCs on certain body sites. The results also demonstrate that BCCs regardless of site, histology or order of occurrence are strongly associated with cumulative sun exposure causing photodamage to the skin, and hence challenge the view that BCCs occurring on body sites with typically low opportunities for sun exposure or of the superficial growth pattern are different in their association with the sun from those on typically sun-exposed sites, or nodular BCCs, respectively. Through dissemination in the scientific and medical literature, and to the community at large, these findings can ultimately assist in the primary and secondary prevention of BCC, perhaps especially in high-risk populations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents a demand side response model (DSR) which assists small electricity consumers, through an aggregator, exposed to the market price to proactively mitigate price and peak impact on the electrical system. The proposed model allows consumers to manage air-conditioning when as a function of possible price spikes. The main contribution of this research is to demonstrate how consumers can minimise the total expected cost by optimising air-conditioning to account for occurrences of a price spike in the electricity market. This model investigates how pre-cooling method can be used to minimise energy costs when there is a substantial risk of an electricity price spike. The model was tested with Queensland electricity market data from the Australian Energy Market Operator and Brisbane temperature data from the Bureau of Statistics during hot days on weekdays in the period 2011 to 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Managing and maintaining infrastructure assets are one of the indispensible tasks for many government agencies to preserve the nations' economic viability and social welfare. To reduce the expenditures over the life-cycle of an infrastructure asset and extend the period for which the asset performs effectively, proper repair and maintenance are essential. While repair, maintenance, minor alteration and addition (RMAA) sector is expanding in many developed cities, occurrences of fatalities and injuries in this sector are also soaring. The purposes of this paper are to identify and then evaluate the various strategies for improving the safety performance of RMAA works. Design/methodology/approach Semi-structured interviews and two rounds of Delphi survey were conducted for data collection. Findings Raising safety awareness of RMAA workers and selecting contractors with a good record of safety performance are the two most important strategies to improve the safety performance in this sector. Technology innovations and a pay-for-safety scheme are regarded as the two least important strategies. Originality/value The paper highlights possible ways to enhance safety of the rather under-explored RMAA sector in the construction industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Construction industry accounts for a tenth of global GDP. Still, challenges such as slow adoption of new work processes, islands of information, and legal disputes, remain frequent, industry-wide occurrences despite various attempts to address them. In response, IT-based approaches have been adopted to explore collaborative ways of executing construction projects. Building Information Modelling (BIM) is an exemplar of integrative technologies whose 3D-visualisation capabilities have fostered collaboration especially between clients and design teams. Yet, the ways in which specification documents are created and used in capturing clients' expectations based on industry standards have remained largely unchanged since the 18th century. As a result, specification-related errors are still common place in an industry where vast amounts of information are consumed as well as produced in the course project implementation in the built environment. By implication, processes such as cost planning which depend on specification-related information remain largely inaccurate even with the use of BIM-based technologies. This paper briefly distinguishes between non-BIM-based and BIM-based specifications and reports on-going efforts geared towards the latter. We review exemplars aimed at extending Building Information Models to specification information embedded within the objects in a product library and explore a viable way of reasoning about a semi-automated process of specification using our product library.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.