992 resultados para 1990s


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Brisbane is provincial city that has been developing rapidly since the early 1990s. The growth and development of its public and semi-public spaces means there are many more ways to engage with the city than was previously possible. --------- I suggest the city’s new and transformed spaces have enabled 2 important developments 1) a growth in forms of sociability and encounters with difference and 2) the negotiation of civic competencies. --------- The paper draws upon research conducted during a PhD project which used multi-method approaches - including qualitative [interviews] and quantitative data [surveys], psychoanalytic theory and text analysis.The study also made connections between the real city and the discursive city to argue that urban experience is constituted both materially and imaginatively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Different terminologies have been used to characterize the Chinese independent cinema in the 1990s. These definitions focus on the experimental practices outside the official production system and independent of official ideology. The film industry has had distinctive development since the entry of WTO in 2001. Private investors have played essential role in cinematic economy; strict censorship has been obviously relaxed; the film industry is being divided into two opposing extremes. Thus, it is necessary to give a new definition of the Chinese independent cinema. The definition of independent cinema in today China I suggest in the light of American independence is that any film that has not been financed, produced and distributed by majors is independent. At least four corporations are majors in the Chinese film industry. They are China Film Group Corporation, Huayi Brothers Corporation, PolyBona Film Distribution Corporation and Shanghai Film Group Corporation. Except the four majors, all the other film production or distribution companies are independents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Before the Global Financial Crisis many providers of finance had growth mandates and actively pursued development finance deals as a way of gaining higher returns on funds with regular capital turnover and re-investment possible. This was able to be achieved through high gearing and low presales in a strong market. As asset prices fell, loan covenants breached and memories of the 1990’s returned, banks rapidly adjusted their risk appetite via retraction of gearing and expansion of presale requirements. Early signs of loosening in bank credit policy are emerging, however parties seeking development finance are faced with a severely reduced number of institutions from which to source funding. The few institutions that are lending are filtering out only the best credit risks by way of constrictive credit conditions including: low loan to value ratios, the corresponding requirement to contribute high levels of equity, lack of support in non-prime locations and the requirement for only borrowers with well established track records. In this risk averse and capital constrained environment, the ability of developers to proceed with real estate developments is still being constrained by their inability to obtain project finance. This paper will examine the pre and post GFC development finance environment. It will identify the key lending criteria relevant to real estate development finance and will detail the related changes to credit policies over this period. The associated impact to real estate development projects will be presented, highlighting the significant constraint to supply that the inability to obtain finance poses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the early 1990’s the United Arab Emirates has been actively seeking to diversify into non-oil sectors. The nation has set out to market itself as a hub for foreign and domestic companies; realizing to achieve these goals that it must provide appropriate e-business frameworks and infrastructures. While the nation itself is paving the way for other nations in the Middle East to undertake electronic business initiatives, the use of everyday e-business in the UAE appears to be somewhat stifled. An investigation into reasons for the apparent low levels of adoption of e-business by UAE inhabitants has been conducted using an autoethnographic research methodology coupled with qualitative interviews of selected stakeholders. Findings from this research may contribute to a better understanding of how e-business initiatives in specific regions need to take into account local cultural and other issues which may be irrelevant elsewhere.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines three functions of music technology in the study of music. Firstly, as a tool, secondly, as an instrument and, lastly, as a medium for thinking. As our societies become increasingly embroiled in digital media for representation and communication, our philosophies of music education need to adapt to integrate these developments while maintaining the essence of music. The foundation of music technology in the 1990s is the digital representation of sound. It is this fundamental shift to a new medium with which to represent sound that carries with it the challenge to address digital technology and its multiple effects on music creation and presentation. In this paper I suggest that music institutions should take a broad and integrated approach to the place of music technology in their courses, based on the understanding of digital representation of sound and these three functions it can serve. Educators should reconsider digital technologies such as synthesizers and computers as music instruments and cognitive amplifiers, not simply as efficient tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the formal recognition of practice-led research in the 1990s, many higher research degree candidates in art, design and media have submitted creative works along with an accompanying written document or ‘exegesis’ for examination. Various models for the exegesis have been proposed in university guidelines and academic texts during the past decade, and students and supervisors have experimented with its contents and structure. With a substantial number of exegeses submitted and archived, it has now become possible to move beyond proposition to empirical analysis. In this article we present the findings of a content analysis of a large, local sample of submitted exegeses. We identify the emergence of a persistent pattern in the types of content included as well as overall structure. Besides an introduction and conclusion, this pattern includes three main parts, which can be summarized as situating concepts (conceptual definitions and theories); precedents of practice (traditions and exemplars in the field); and researcher’s creative practice (the creative process, the artifacts produced and their value as research). We argue that this model combines earlier approaches to the exegesis, which oscillated between academic objectivity, by providing a contextual framework for the practice, and personal reflexivity, by providing commentary on the creative practice. But this model is more than simply a hybrid: it provides a dual orientation, which allows the researcher to both situate their creative practice within a trajectory of research and do justice to its personally invested poetics. By performing the important function of connecting the practice and creative work to a wider emergent field, the model helps to support claims for a research contribution to the field. We call it a connective model of exegesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The privatization of major Australian airports in the late 1990s unleashed an unprecedented development wave as corporate lessees implemented ambitious business plans. While planning and environmental regulations governing on-airport development were significantly enhanced, there has been national disquiet about a governance regime that remains under the auspices of the federal government and is not effectively integrated into state and local decision-making machinery. Tensions in major airport regions have been exacerbated by the building of highly conspicuous non-aeronautical developments approved with no determining input by local decision-makers as well as the growing pressures on off-airport locations for aviation-related development. This paper canvasses this context and overviews the evolving structure of planning controls for Australia’s privatized federal airports. A range of issues surfacing through the National Aviation Policy Review process in 2008–2009 is described.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Yeronga State School, located 7 km from the city in Brisbane, Queensland, opened in 1871. YSS caters for a middle class inner-suburban community, however, from the mid 1990s enrolments brought new forms of socio-economic, cultural and linguistic diversity. Initially, ESL students were enrolled due to their immigrant parents enrolling in the neighbouring TAFE. Then refugee families from Bosnia and the Middle East became part of the YSS community. In recent years, refugee numbers have accounted for up to 23% of the school population. Many of these new arrivals left behind families in war-torn circumstances, were orphaned or came to live with unknown relatives. Some family members were victims of torture which may have been witnessed by the children. Trauma for some or all family members was a very real concern. Others were born in refugee camps, where food was scarce, belongings needed to be guarded and safety was never guaranteed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditional Birth Attendants (TBA) training has been an important component of public health policy interventions to improve maternal and child health in developing countries since the 1970s. More recently, since the 1990s, the TBA training strategy has been increasingly seen as irrelevant, ineffective or, on the whole, a failure due to evidence that the maternal mortality rate (MMR) in developing countries had not reduced. Although, worldwide data show that, by choice or out of necessity, 47 percent of births in the developing world are assisted by TBAs and/or family members, funding for TBA training has been reduced and moved to providing skilled birth attendants for all births. Any shift in policy needs to be supported by appropriate evidence on TBA roles in providing maternal and infant health care service and effectiveness of the training programmes. This article reviews literature on the characteristics and role of TBAs in South Asia with an emphasis on India. The aim was to assess the contribution of TBAs in providing maternal and infant health care service at different stages of pregnancy and after-delivery and birthing practices adopted in home births. The review of role revealed that apart from TBAs, there are various other people in the community also involved in making decisions about the welfare and health of the birthing mother and new born baby. However, TBAs have changing, localised but nonetheless significant roles in delivery, postnatal and infant care in India. Certain traditional birthing practices such as bathing babies immediately after birth, not weighing babies after birth and not feeding with colostrum are adopted in home births as well as health institutions in India. There is therefore a thin precarious balance between the application of biomedical and traditional knowledge. Customary rituals and perceptions essentially affect practices in home and institutional births and hence training of TBAs need to be implemented in conjunction with community awareness programmes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the intersection of popular cultural representations of HIV and AIDS and the discourses of public health campaigns. Part Two provides a comprehensive record of all HIV related storylines in Australian television drama from the first AIDS episode of The Flying Doctors in 1986 to the ongoing narrative of Pacific Drive, with its core HIV character, in 1996. Textual representations are examined alongside the agency of "cultural technicians" working within the television industry. The framework for this analysis is established in Part One of the thesis, which examines the discursive contexts for speaking about HIV and AIDS established through national health policy and the regulatory and industry framework for broadcasting in Australia. The thesis examines the dominant liberal democratic framework for representation of HIV I AIDS and adopts a Foucauldian understanding of the processes of governmentality to argue that during the period of the 1980s and 1990s a strand of social democratic discourse combined with practices of self management and the management of the Australian population. The actions of committed agents within both domains of popular culture and health education ensured that more challenging expressions of HIV found their way into public culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"The 1990s saw the United Nations, the militaries of key member states, and NGOs increasingly entangled in the complex affairs of disrupted states. Whether as deliverers of humanitarian assistance or as agents of political, social, and civic reconstruction, whether in Somalia, Bosnia, Kosovo, or East Timor, these actors have had to learn ways of interacting with each other in order to optimize the benefits for the populations they seek to assist. Yet the challenges have proved daunting. Civil and military actors have different organizational cultures and standard operating procedures and are confronted with the need to work together to perform tasks to which different actors may attach quite different priorities."--BOOK JACKET.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 1990s saw the United Nations, the militaries of key member states, and NGOs increasingly entangled in the complex affairs of disrupted states. Whether as deliverers of humanitarian assistance or as agents of political, social, and civic reconstruction, whether in Somalia, Bosnia, Kosovo, or East Timor, these actors have had to learn ways of interacting with each other in order to optimize the benefits for the populations they seek to assist. Yet the challenges have proved daunting. Civil and military actors have different organizational cultures and standard operating procedures and are confronted with the need to work together to perform tasks to which different actors may attach quite different priorities. From Civil Strife to Civil Society explores the nature of these challenges, blending the experience of scholars and practitioners. It is underpinned by an understanding that recovery from disruption is a laborious process that can easily be de-railed. The first part of the book offers a rigorous examination of the dimensions of state disruption and the roles of the international community in responding to it; the second part looks at military doctrine for dealing with disorder and humanitarian emergencies; the third part examines mechanisms for ending violence and delivering justice in post-conflict times; the fourth part investigates the problems of rebuilding trust and promoting democracy; the fifth part deals with the reconstitution of the rule of law; while the sixth and seventh parts address the reestablishment of social and civil order.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The late French philosopher Gilles Deleuze has enjoyed significant notoriety and acclaim in American academia over the last 20 years. The unique disciplinary focus of the contemporary discussion has derived from Deleuze the architectural possibilities of biotechnology, systems theory, and digital processualism. While the persistence of Deleuze’s theory of science and the formalist readings of Mille Plateaux and Le Bergsonisme have dominated the reception since the 1990s, few are aware of a much earlier encounter between Deleuze and architects, beginning at Columbia University in the 1970s, which converged on the radical politics of Anti-OEdipus and its American reception in the journal Semiotext(e), through which architecture engaged a much broader discourse alongside artists, musicians, filmmakers, and intellectuals in the New York aesthetic underground, of which Deleuze and Félix Guattari were themselves a part.