995 resultados para THREE-PARTY
Resumo:
Objective. To describe physical activity participation in three Queensland regional communities. Design. Cross-sectional mail survey of randomly selected residents, stratified by age and sex. Setting. Esk, Mareeba and Mount Isa. Participants. 1219 (58% female) adults, with a mean age 46.7 (SD 14.7) years. Main outcome measures. Proportion of people inactive, meeting Australian activity guidelines (a minimum of 150 minutes/week and 5 sessions/week), and walking a dog daily; time spent walking and cycling for transport; location and type of recreational physical activities. Results. Overall, 18% of respondents were inactive, with the highest proportions among women (22.3%) and older adults in Mount Isa (24.3%). The proportion meeting activity guidelines was 47% with the lowest proportions among women in Mount Isa (40.4%). Although 63% reported owning a dog, only 22% reported walking a dog daily. Few people reported walking or cycling for transport. The most common types of activities were walking, home-based exercise, running/jogging, and swimming, and the most common location was at or near home. Conclusions. Physical activity levels were lower in these regional communities than the state average. The findings indicate a need for physical activity policy and intervention strategies targeting regional and rural areas. This could focus on women and older adults, dog walking, and physical activity opportunities in or near the home.
Resumo:
The purpose of this paper is to develop a second-moment closure with a near-wall turbulent pressure diffusion model for three-dimensional complex flows, and to evaluate the influence of the turbulent diffusion term on the prediction of detached and secondary flows. A complete turbulent diffusion model including a near-wall turbulent pressure diffusion closure for the slow part was developed based on the tensorial form of Lumley and included in a re-calibrated wall-normal-free Reynolds-stress model developed by Gerolymos and Vallet. The proposed model was validated against several one-, two, and three-dimensional complex flows.
Resumo:
This project advances current understanding of intra-urban rail passengers and their travel experiences in order to help rail industry leaders tailor policy approaches to fit specific, relevant segments of their target population. Using a Q sorting technique and cluster analysis, our preliminary research identified five perspectives occurring in a small sample of rail passengers, who varied in their frequency and location of rail travel as well as certain socio-demographic characteristics. Revealed perspectives (named to capture the gist of their content) included: ‘Rail Travel is About the Destination, Not the Journey’; ‘Despite Challenges, Public Transport is Still the Best Option’; ‘Rail Travel is Fine’; ‘Rail Travel? So Far, So Good’; and ‘Bad Taste for Rail Travel’. This paper discusses each of the perspectives in detail, and considers them in terms of tailored policy implications. An overarching finding from this study is that improving railway travel ‘access’ requires attention to physical, psychological, financial, and social facets of accessibility. For example, designing waiting areas to be more socially functional and comfortable has the potential to increase ridership by addressing social forms of access, decreasing perceived wait times, and making time at the station feel like time well spent. Even at this preliminary stage, the Q sorting technique promises to provide a valuable, holistic albeit fine-grained analysis of passenger attitudes and experiences that will assist industry efforts to increase ridership.
Resumo:
The Clarence-Moreton Basin (CMB) covers approximately 26000 km2 and is the only sub-basin of the Great Artesian Basin (GAB) in which there is flow to both the south-west and the east, although flow to the south-west is predominant. In many parts of the basin, including catchments of the Bremer, Logan and upper Condamine Rivers in southeast Queensland, the Walloon Coal Measures are under exploration for Coal Seam Gas (CSG). In order to assess spatial variations in groundwater flow and hydrochemistry at a basin-wide scale, a 3D hydrogeological model of the Queensland section of the CMB has been developed using GoCAD modelling software. Prior to any large-scale CSG extraction, it is essential to understand the existing hydrochemical character of the different aquifers and to establish any potential linkage. To effectively use the large amount of water chemistry data existing for assessment of hydrochemical evolution within the different lithostratigraphic units, multivariate statistical techniques were employed.
Resumo:
This paper presents a novel evolutionary computation approach to three-dimensional path planning for unmanned aerial vehicles (UAVs) with tactical and kinematic constraints. A genetic algorithm (GA) is modified and extended for path planning. Two GAs are seeded at the initial and final positions with a common objective to minimise their distance apart under given UAV constraints. This is accomplished by the synchronous optimisation of subsequent control vectors. The proposed evolutionary computation approach is called synchronous genetic algorithm (SGA). The sequence of control vectors generated by the SGA constitutes to a near-optimal path plan. The resulting path plan exhibits no discontinuity when transitioning from curve to straight trajectories. Experiments and results show that the paths generated by the SGA are within 2% of the optimal solution. Such a path planner when implemented on a hardware accelerator, such as field programmable gate array chips, can be used in the UAV as on-board replanner, as well as in ground station systems for assisting in high precision planning and modelling of mission scenarios.
Resumo:
This article discusses David M. Thomas' 2012 exhibition at Boxcopy. Thomas' exhibition conflates the space of the studio with that of the gallery. In doing so, he draws out complex relationships between production and presentation, subjectivity and sociality. This article focuses on these aspects of Thomas' creative exploration of identity and its mutability through art making.
Resumo:
All elections are unique, but the Australian federal election of 2010 was unusual for many reasons. It came in the wake of the unprecedented ousting of the Prime Minister who had led the Australian Labor Party to a landslide victory, after eleven years in opposition, at the previous election in 2007. In a move that to many would have been unthinkable, Kevin Rudd’s increasing unpopularity within his own parliamentary party finally took its toll and in late June he was replaced by his deputy, Julia Gillard. Thus the second unusual feature of the election was that it was contested by Australia’s first female prime minister. The third unusual feature was that the election almost saw a first-term government, with a comfortable majority, defeated. Instead it resulted in a hung parliament, for the first time since 1940, and Labor scraped back into power as a minority government, supported by three independents and the first member of the Australian Greens ever to be elected to the House of Representatives. The Coalition Liberal and National opposition parties themselves had a leader of only eight months standing, Tony Abbott, whose ascension to the position had surprised more than a few. This was the context for an investigation of voting behaviour in the 2010 election....
Resumo:
Shared services are increasingly prevalent in practice, their introduction potentially entailing substantive and highly consequential organizational redesign. Yet, attention to the structural arrangements of shared services has been limited. This study explores types of structural arrangements for shared services that are observed in practice, and the salient dimensions along which those types can be usefully differentiated. Through inductive attention to the shared services literature, and content analysis of 36 secondary case studies of shared services in the higher education sector, three salient dimensions emerged: (1) the existence or not of a separate organizational entity, (2) an intra- or inter-organizational sharing boundary, and (3) involvement or not of a third party. Each dimension being dichotomous yields 23 combinations, or eight shared services structural arrangement types. Each of the eight structural arrangement types is defined and demonstrated through case examples. The typology offers clarity around shared services structural arrangements. It can serve as a useful analytical tool for researchers investigating the phenomenon further, and for practitioners considering the introduction or further development of shared services arrangements. Important follow on research is suggested too.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Parabolic Trough Concentrators (PTC) are the most proven solar collectors for solar thermal power plants, and are suitable for concentrating photovoltaic (CPV) applications. PV cells are sensitive to spatial uniformity of incident light and the cell operating temperature. This requires the design of CPV-PTCs to be optimised both optically and thermally. Optical modelling can be performed using Monte Carlo Ray Tracing (MCRT), with conjugate heat transfer (CHT) modelling using the computational fluid dynamics (CFD) to analyse the overall designs. This paper develops and evaluates a CHT simulation for a concentrating solar thermal PTC collector. It uses the ray tracing work by Cheng et al. (2010) and thermal performance data for LS-2 parabolic trough used in the SEGS III-VII plants from Dudley et al. (1994). This is a preliminary step to developing models to compare heat transfer performances of faceted absorbers for concentrating photovoltaic (CPV) applications. Reasonable agreement between the simulation results and the experimental data confirms the reliability of the numerical model. The model explores different physical issues as well as computational issues for this particular kind of system modeling. The physical issues include the resultant non-uniformity of the boundary heat flux profile and the temperature profile around the tube, and uneven heating of the HTF. The numerical issues include, most importantly, the design of the computational domain/s, and the solution techniques of the turbulence quantities and the near-wall physics. This simulation confirmed that optical simulation and the computational CHT simulation of the collector can be accomplished independently.
Resumo:
The LIS profession in Australia is a small world where connections are vital for career success and developing resilience. So what about those of us who feel like wallflowers at the party, always on the margins? It can be difficult for quieter souls to step up, get involved and build relationships. A major hurdle for many people, both introverts and extroverts, is figuring out how to proclaim their awesomeness to the world but in a way that is unique to them. The aim of this session is to inspire and challenge students, new grads and anyone who has a fear of networking to take risks and explore a different more social side of themselves without changing their personalities. This is a deeply personal topic with plenty of fear and self-image issues at stake. As well, most of us have had very few opportunities to find role models or a chance to practice in a comfortable environment. Therefore the authors will present strategies for success based on their personal experiences. We will demonstrate the actual benefits we have attained through our networking and volunteer activities. We hope that attendees will come away with some realistic strategies and goals to create lasting relationships with present and future colleagues such as we have enjoyed. Our networking tips may not transform you into the belle of the ball but you will have more confidence to get out on the dance floor and dance to your own beat.
Resumo:
California is home to multiple queer community archives created by community members outside of government, academic, and public archives. These archives are maintained by the communities and are important spaces not only for the preservation of records, but also as safe spaces to study, gather, and learn about the communities’ histories. This article describes the histories of three such queer community archives (Gay, Lesbian, Bisexual, Transgender Historical Society Lavender Library, Archives, and Cultural Exchange of Sacramento, Inc.; and ONE National Gay & Lesbian Archives) in order to discuss the role of activism in the community archives and implications for re-examining the role of activism to incorporate communities into the heart of archival professional work. By understanding the impetus for creating and maintaining queer community archives, archivists can use this knowledge to foster more reflective practices to be more inclusive in their archival practices through outreach, collaboration, and descriptive practices. This article extends our knowledge of community archives and provides evidence for the need to include communities in archival professional practice.
Resumo:
Video-based training combined with flotation tank recovery may provide an additional stimulus for improving shooting in basketball. A pre-post controlled trial was conducted to assess the effectiveness of a 3 wk intervention combining video-based training and flotation tank recovery on three-point shooting performance in elite female basketball players. Players were assigned to an experimental (n=10) and control group (n=9). A 3 wk intervention consisted of 2 x 30 min float sessions a week which included 10 min of video-based training footage, followed by a 3 wk retention phase. A total of 100 three-point shots were taken from 5 designated positions on the court at each week to assess three-point shooting performance. There was no clear difference in the mean change in the number of successful three-point shots between the groups (-3%; ±18%, mean; ±90% confidence limits). Video-based training combined with flotation recovery had little effect on three-point shooting performance.
Resumo:
In Legal Services Commissioner and Wright [2010] QSC 168 and Amos v Ian K Fry & Company, the Supreme Court of Queensland considered the scope of some of the provisions of the Legal Profession Act 2007 (Qld), including the definition of “third party payer” in s 301 of the Act.
Resumo:
The decision in the New South Wales Supreme Court in Boyce v McIntyre [2008] NSWSC 1218 involved determination of a number of issues relating to an assessment of costs under the Legal Profession Act 2004 (NSW). The issue of broad significance was whether a non-associated third party payer must pay the fixed fee that was agreed between the law practice and the client. The court found that the client agreement did not form the basis of assessing costs for the non-associated third party payer.