995 resultados para Path protection
Resumo:
Objects in an environment are often encountered sequentially during spatial learning, forming a path along which object locations are experienced. The present study investigated the effect of spatial information conveyed through the path in visual and proprioceptive learning of a room-sized spatial layout, exploring whether different modalities differentially depend on the integrity of the path. Learning object locations along a coherent path was compared with learning them in a spatially random manner. Path integrity had little effect on visual learning, whereas learning with the coherent path produced better memory performance than random order learning for proprioceptive learning. These results suggest that path information has differential effects in visual and proprioceptive spatial learning, perhaps due to a difference in the way one establishes a reference frame for representing relative locations of objects.
Resumo:
language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Resumo:
A novel platform consisting of a multilayered substrate, activated graphite-like carbon film, and dense forest of long, vertically-aligned multiwall carbon nanotubes grown by the chemical vapor deposition is designed, fabricated, and tested for covalent immobilization of enzymatic biocatalysts with the aim of protecting them from shear forces and microbial attacks present in bioreactors. The covalent bonding ensures enzyme retention in a flow, while the dense nanotube forest may serve as a protection of the enzymes from microbial attack without impeding the flow of reactants and products. This platform was demonstrated for the two reference enzymes, horseradish peroxidase and catalase, which were immobilized without degrading their biological activity. This combination of an activated carbon layer for an efficient immobilization of biocatalysts with a protective layer of inert carbon nanotubes could dramatically improve the efficiency and longevity of enzymatic bio-catalysis employed in a large variety of advanced biotechnological processes.
Resumo:
Semiconductor III-V quantum dots (QDs) are particularly enticing components for the integration of optically promising III-V materials with the silicon technology prevalent in the microelectronics industry. However, defects due to deviations from a stoichiometric composition [group III: group V = 1] may lead to impaired device performance. This paper investigates the initial stages of formation of InSb and GaAs QDs on Si(1 0 0) through hybrid numerical simulations. Three situations are considered: a neutral gas environment (NG), and two ionized gas environments, namely a localized ion source (LIS) and a background plasma (BP) case. It is shown that when the growth is conducted in an ionized gas environment, a stoichiometric composition may be obtained earlier in the QD as compared to a NG. Moreover, the stoichiometrization time, tst, is shorter for the BP case compared to the LIS scenario. A discussion of the effect of ion/plasma-based tools as well as a range of process conditions on the final island size distribution is also included. Our results suggest a way to obtain a deterministic level of control over nanostructure properties (in particular, elemental composition and size) during the initial stages of growth which is a crucial step towards achieving highly tailored QDs suitable for implementation in advanced technological devices.
Resumo:
Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.
Aligning off-balance sheet risk, on-balance sheet risk and audit fees: a PLS path modelling analysis
Resumo:
This study focuses on using the partial least squares (PLS) path modelling technique in archival auditing research by replicating the data and research questions from prior bank audit fee studies. PLS path modelling allows for inter-correlations among audit fee determinants by establishing latent constructs and multiple relationship paths in one simultaneous PLS path model. Endogeneity concerns about auditor choice can also be addressed with PLS path modelling. With a sample of US bank holding companies for the period 2003-2009, we examine the associations among on-balance sheet financial risks, off-balance sheet risks and audit fees, and also address the pervasive client size effect, and the effect of the self-selection of auditors. The results endorse the dominating effect of size on audit fees, both directly and indirectly via its impacts on other audit fee determinants. By simultaneously considering the self-selection of auditors, we still find audit fee premiums on Big N auditors, which is the second important factor on audit fee determination. On-balance-sheet financial risk measures in terms of capital adequacy, loan composition, earnings and asset quality performance have positive impacts on audit fees. After allowing for the positive influence of on-balance sheet financial risks and entity size on off-balance sheet risk, the off-balance sheet risk measure, SECRISK, is still positively associated with bank audit fees, both before and after the onset of the financial crisis. The consistent results from this study compared with prior literature provide supporting evidence and enhance confidence on the application of this new research technique in archival accounting studies.
Aligning off-balance sheet risk, on-balance sheet risk and audit fees: a PLS path modelling analysis
Resumo:
This study focuses on using the partial least squares (PLS) path modelling methodology in archival auditing research by replicating the data and research questions from prior bank audit fee studies. PLS path modelling allows for inter-correlations among audit fee determinants by establishing latent constructs and multiple relationship paths in one simultaneous PLS path model. Endogeneity concerns about auditor choice can also be addressed with PLS path modelling. With a sample of US bank holding companies for the period 2003-2009, we examine the associations among on-balance sheet financial risks, off-balance sheet risks and audit fees, and also address the pervasive client size effect, and the effect of the self-selection of auditors. The results endorse the dominating effect of size on audit fees, both directly and indirectly via its impacts on other audit fee determinants. By simultaneously considering the self-selection of auditors, we still find audit fee premiums on Big N auditors, which is the second important factor on audit fee determination. On-balance-sheet financial risk measures in terms of capital adequacy, loan composition, earnings and asset quality performance have positive impacts on audit fees. After allowing for the positive influence of on-balance sheet financial risks and entity size on off-balance sheet risk, the off-balance sheet risk measure, SECRISK, is still positively associated with bank audit fees, both before and after the onset of the financial crisis. The consistent results from this study compared with prior literature provide supporting evidence and enhance confidence on the application of this new research technique in archival accounting studies.
Resumo:
This thesis has developed a new approach to trace virtual protection signals in Electrical substation networks. The main goal of the research was to analyse the contents of the virtual signals transferred, using third party software. In doing so, a comprehensive test was done on a distance protection relay, using non-conventional test equipment.
Resumo:
Nature exists. Humans exist. The behaviour of one impacts upon the other. The behaviour of humans is governed by the artificial contrivance described as the law. While the law can in this way control the behaviour of humans and the impact that human behaviour has on nature, the behaviour of nature is governed – if at all- in accordance with nature’s own sets of values which are quintessentially a matter for nature. The relationship between nature and humans may be the object of rules of law, but traditional legal doctrine dictates that humans but not nature are the subjects of the rules of law. The jurisprudence of the earth – it would appear – seeks to equalise in the eyes of the law nature as part of the global environment and humans as part of the global environment. How might this be done?
Resumo:
Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
Protection for employees from unfair dismissal (UFD) has been around in Australia under various guises for 30 years or so (Chapman, 2006). Labour standards, and particularly ILO Convention 158 (Convention Concerning Termination of Employment at the Initiative of the Employer 1982), underpin the adoption of a particular form of federal statutory UFD regime which first appeared in the 1993 reforms to the Industrial Relations Act 1998 (Commonwealth). Its existence, however, has not been uncontroversial, and the meaning, operation, scope and remedies have attracted attention over time. In fact, the first reforms to the federal UFD regime were undertaken under the Keating Labor government three months after they were enacted (Chapman, ibid.). Further reforms were made by the incoming Howard Liberal-national coalition government through the Workplace Relations Act 1996 (Commonwealth) (WRA), and arguably these reforms continued down the ‘contraction’ path (ibid.).
Resumo:
This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.
Resumo:
The work presented in this report is aimed to implement a cost-effective offline mission path planner for aerial inspection tasks of large linear infrastructures. Like most real-world optimisation problems, mission path planning involves a number of objectives which ideally should be minimised simultaneously. Understandably, the objectives of a practical optimisation problem are conflicting each other and the minimisation of one of them necessarily implies the impossibility to minimise the other ones. This leads to the need to find a set of optimal solutions for the problem; once such a set of available options is produced, the mission planning problem is reduced to a decision making problem for the mission specialists, who will choose the solution which best fit the requirements of the mission. The goal of this work is then to develop a Multi-Objective optimisation tool able to provide the mission specialists a set of optimal solutions for the inspection task amongst which the final trajectory will be chosen, given the environment data, the mission requirements and the definition of the objectives to minimise. All the possible optimal solutions of a Multi-Objective optimisation problem are said to form the Pareto-optimal front of the problem. For any of the Pareto-optimal solutions, it is impossible to improve one objective without worsening at least another one. Amongst a set of Pareto-optimal solutions, no solution is absolutely better than another and the final choice must be a trade-off of the objectives of the problem. Multi-Objective Evolutionary Algorithms (MOEAs) are recognised to be a convenient method for exploring the Pareto-optimal front of Multi-Objective optimization problems. Their efficiency is due to their parallelism architecture which allows to find several optimal solutions at each time
Resumo:
This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.