983 resultados para 237


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Review(s) of: The journalist's guide to media law, 4th edition, by Mark Pearson and Mark Polden, Sydney: Allen and Unwin, 2011, 480 pp. ISBN 9781742370385; Blogging and tweeting without getting sued: A global guide to the law for anyone writing online, by Mark Pearson, Sydney: Allen and Unwin, 2012, 222 pp. ISBN 9781742378770.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Whilst native French speakers oftentimes collapse accountability to account giving, this paper outlines the shape of an accountability ala française. Reading Tocqueville’s (1835) work highlights that accountability as practiced in Anglo-Saxonc countries has been an offspring of American democracy. An accountability a la française would be characterised by conformance to a set or universal values, the submission of minorities to choices made by the majority, a means obligation as well as the rejection of transparency. [Alors que le francophone réduit généralement l’accountability à la reddition de comptes, cet article esquisse les contours d’une véritable accountability à la française. La lecture de Tocqueville (1835) révèle que l’accountability pratiquée dans les pays anglo-saxons trouve ses origines dans les fondements de la démocratie américaine. En France, l’accountability serait caractérisée par le respect d’un ensemble de valeurs universelles, l’adhésion des minorités aux choix majoritaires, l’absence de discriminations, une obligation de moyens et un rejet de la transparence.]

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter examines local community experiences, understandings and changes attending the presence of mining activity, in particular as occurred in the Shire of Ravensthorpe in the South West of Western Australia (WA). It does so by drawing on an extensive ethnographic study spanning the development, opening, and closure of BHP Billiton’s Ravensthorpe Nickel Operation (RNO). Given that the negative consequences of mining activity are most evident and complex at the local level, it is crucial that we understand and address how communities (and the individuals and families who are both part of and are shaped by communities) experience the impacts of mining. Though difficult to measure, social and cultural dimensions of mining at the local scale, as this chapter demonstrates, are central to our understanding of mining as a curse or cure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Современный этап развития комплексов автоматического управления и навигации малогабаритными БЛА многократного применения предъявляет высокие требования к автономности, точности и миниатюрности данных систем. Противоречивость требований диктует использование функционального и алгоритмического объединения нескольких разнотипных источников навигационной информации в едином вычислительном процессе на основе методов оптимальной фильтрации. Получили широкое развитие бесплатформенные инерциальные навигационные системы (БИНС) на основе комплексирования данных микромеханических датчиков инерциальной информации и датчиков параметров движения в воздушном потоке с данными спутниковых навигационных систем (СНС). Однако в современных условиях такой подход не в полной мере реализует требования к помехозащищённости, автономности и точности получаемой навигационной информации. Одновременно с этим достигли значительного прогресса навигационные системы, использующие принципы корреляционно экстремальной навигации по оптическим ориентирам и цифровым картам местности. Предлагается схема построения автономной автоматической навигационной системы (АНС) для БЛА многоразового применения на основе объединения алгоритмов БИНС, спутниковой навигационной системы и оптической навигационной системы. The modern stage of automatic control and guidance systems development for small unmanned aerial vehicles (UAV) is determined by advanced requirements for autonomy, accuracy and size of the systems. The contradictory of the requirements dictates novel functional and algorithmic tight coupling of several different onboard sensors into one computational process, which is based on methods of optimal filtering. Nowadays, data fusion of micro-electro mechanical sensors of inertial measurement units, barometric pressure sensors, and signals of global navigation satellite systems (GNSS) receivers is widely used in numerous strap down inertial navigation systems (INS). However, the systems do not fully comply with such requirements as jamming immunity, fault tolerance, autonomy, and accuracy of navigation. At the same time, the significant progress has been recently demonstrated by the navigation systems, which use the correlation extremal principle applied for optical data flow and digital maps. This article proposes a new architecture of automatic navigation management system (ANMS) for small UAV, which combines algorithms of strap down INS, satellite navigation and optical navigation system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2008 we brought together much work at the intersection of entrepreneurship and human resource management (HRM) (Barrett & Mayson, 2008), after calls for more research (Baron, 2003; Katz, Aldrich, Welbourne & Williams, 2000; Tansky & Heneman, 2003). More has been collated since (Soriano, Dobon & Tansky, 2010; Tansky, Soriano & Dobon, 2010). We think it is now time again to regroup, pull conversational threads together and have a critical look at recent research at the intersection of HRM and Entrepreneurship. As editors of International Handbook of Entrepreneurship and HRM (Barrett & Mayson, 2008) we were privileged to collect 23 wonderfully diverse chapters from scholars around the globe addressing a range of issues at the intersection of the two pertinent disciplines or fields: HRM and entrepreneurship. This edition represented a coalescing of ideas that had been swirling about for some time. In three sections, the first dealt with theory and research methods, the second with the nature of HRM in small and entrepreneurial firms and the third with the functional aspects of HRM. At the time we were aware that the handbook did not cover the entire field and many topics were left unexplored. For example, the topic of regulation was generally absent while issues such as career advancement, performance management, organisational change and gender, diversity and ethnicity were also missing. In essence, the majority of those contributions sought to develop an understanding of the context in which particular aspects of HRM can be played out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study is the first of its kind in Australia to use the deliberative small group methodology to explore participants’ deeper, nuanced thoughts on specific criminal justice issues in order to gain insight into the underlying beliefs that influence people’s opinions on sentencing. The use of small group discussions allows an analysis of the dynamics of people’s interactions and the potential of these to elicit deeper, more thoughtful deliberation. Participants’ comments around two policy areas – mandatory sentencing and the use of alternatives to imprisonment – were founded on concerns about the need for judges to tailor the sentence to fit the specific circumstances of each case. The methodology itself has shown that people may change their initial opinions on complex issues when given the opportunity to discuss and reflect on their beliefs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents mathematical models to simulate coupled heat and mass transfer during convective drying of food materials using three different effective diffusivities: shrinkage dependent, temperature dependent and average of those two. Engineering simulation software COMSOL Multiphysics was utilized to simulate the model in 2D and 3D. The simulation results were compared with experimental data. It is found that the temperature dependent effective diffusivity model predicts the moisture content more accurately at the initial stage of the drying, whereas, the shrinkage dependent effective diffusivity model is better for the final stage of the drying. The model with shrinkage dependent effective diffusivity shows evaporative cooling phenomena at the initial stage of drying. This phenomenon was investigated and explained. Three dimensional temperature and moisture profiles show that even when the surface is dry, inside of the sample may still contain large amount of moisture. Therefore, drying process should be carefully dealt with otherwise microbial spoilage may start from the centre of the ‘dried’ food. A parametric investigation has been conducted after the validation of the model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper contributes to conversations about school, post-compulsory and further education policy by reporting findings from a three-year study with disaffected students who have been referred to special “behaviour” schools. Contrary to popular opinion, our research finds that these “ignorant yobs” (Tomlinson, 2012) do value education and know what it is for. They also have aspirations for a secure, productive and fulfilled life, although it may not involve university level study. Importantly, we found that students who responded negatively with regard to the importance of schooling tended to envision future lives and occupations for which they believed school knowledge was unnecessary. The implications of this research for school, post-compulsory and further education policy are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Few studies have examined the long-term changes experienced by women treated for endometrial cancer. Objective The objectives of this study were to describe what women perceived important to their lifestyle and quality of life in the years following their diagnosis and to provide new insights that might inform healthcare practice. Methods This was a thematic analysis of 237 open-ended comments from Australian women diagnosed with endometrial cancer 3 to 5 years previously. Results We identified 3 main themes: (1) personal change, in which women spoke about cancer as permanently altering their lives in mostly negative but sometimes positive ways; (2) continuity of former life, which described both the minimal impact of cancer on women's lives and identities and the difficulties negotiating this within the dominant "cancer survivorship" culture; (3) social support, where women wrote about how the quality of their relationships shaped their cancer trajectory. Conclusions While typical "survivorship" issues exist for many women with endometrial cancer (eg, physical, emotional, sexual health changes), a proportion of women will not be focused on their cancer and can be encouraged to form lives and identities that are not situated within the "cancer survivorship" culture. Implications for Practice A network of support, sensitive to women's responses to having cancer, may benefit women's long-term adjustment. Regular standardized assessment of women's needs may facilitate appropriate support for those with concerns, whereas those without concerns could be reassured by health professionals that their experience is normal and shared by other people with cancer. This may encourage women to form lives that are personally meaningful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective Smoking prevalence among Vietnamese men is among the highest in the world. Our aim was to provide estimates of tobacco attributable mortality to support tobacco control policies. Method We used the Peto–Lopez method using lung cancer mortality to derive a Smoking Impact Ratio (SIR) as a marker of cumulative exposure to smoking. SIRs were applied to relative risks from the Cancer Prevention Study, Phase II. Prevalence-based and hybrid methods, using the SIR for cancers and chronic obstructive pulmonary disease and smoking prevalence for all other outcomes, were used in sensitivity analyses. Results When lung cancer was used to measure cumulative smoking exposure, 28% (95% uncertainty interval 24–31%) of all adult male deaths (> 35 years) in Vietnam in 2008 were attributable to smoking. Lower estimates resulted from prevalence-based methods [24% (95% uncertainty interval 21–26%)] with the hybrid method yielding intermediate estimates [26% (95% uncertainty interval 23–28%)]. Conclusion Despite uncertainty in these estimates of attributable mortality, tobacco smoking is already a major risk factor for death in Vietnamese men. Given the high current prevalence of smoking, this has important implications not only for preventing the uptake of tobacco but also for immediate action to adopt and enforce stronger tobacco control measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Forensic victimology is intended to serve the justice system by educating it. This area of study is aimed at helping to provide for informed investigations, to require scientific examinations of victim evidence to be presented in court, and to result in more informed legal outcomes. The purpose of this chapter is to provide a discussion regarding the nature and scope of forensic victimology, its investigative implications, and its impact on court proceedings. We will begin with a brief section outlining the more Traditional Victimology...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent changes in the aviation industry and in the expectations of travellers have begun to alter the way we approach our understanding, and thus the segmentation, of airport passengers. The key to successful segmentation of any population lies in the selection of the criteria on which the partitions are based. Increasingly, the basic criteria used to segment passengers (purpose of trip and frequency of travel) no longer provide adequate insights into the passenger experience. In this paper, we propose a new model for passenger segmentation based on the passenger core value, time. The results are based on qualitative research conducted in-situ at Brisbane International Terminal during 2012-2013. Based on our research, a relationship between time sensitivity and degree of passenger engagement was identified. This relationship was used as the basis for a new passenger segmentation model, namely: Airport Enthusiast (engaged, non time sensitive); Time Filler (non engaged, non time sensitive); Efficiency Lover (non engaged, time sensitive) and Efficient Enthusiast (engaged, time sensitive). The outcomes of this research extend the theoretical knowledge about passenger experience in the terminal environment. These new insights can ultimately be used to optimise the allocation of space for future terminal planning and design.