871 resultados para Difference schemes
Resumo:
What do we know? • Customer Experience is increasingly becoming the new standard for differentiation in both offline and online retailing, and offers a sustainable competitive advantage. o The economic value of a company’s offering has been observed to increase when the customer has a fulfilling shopping experience (Pine & Gilmore, 1998) o Crafting engaging and customer experience is a known method of generating loyalty, advocacy and word of mouth (Tynan & McKechnie, 2009). o A good experience can entice consumers to shop for longer and spend more (Kim, 2001). • The customer’s experience is made up of diverse elements occurring before, during and after the purchase itself. (Discussed further on page 5). It is cumulative over time and can be influenced by touch points across multiple channels. What remains unclear? • How do Coles customers respond to the elements of online customer experience? • How does the online customer experience differ for frequent and infrequent purchasers? • Do differences between genders and age cohorts for online customer experience exist?
Resumo:
Transfer schemes are an alternative means of acquiring control of a company to making a takeover bid under the provisions in Ch 6 of the Corporations Act 2001 (Cth). The recent decision Re Kumarina Resources Ltd [2013] FCA 549 overturned long-standing practice in relation to a certain type of transfer scheme. If followed, the decision would allow a “bidder” to vote at scheme meetings where the scheme consideration for the acquisition of the target shares are shares in another company, and the scheme results in a merger. But the bidder is not allowed to vote where the scheme consideration is cash. The article points out the difficulties arising from this decision and argues that it should not be followed. In providing a “no objection” statement, the Australian Securities and Investments Commission (ASIC) has created uncertainty as to the approach it will take towards the bidders being allowed to vote at scheme meetings where the scheme consideration for the acquisition of target shares are shares in another company. The article also points out that in providing the no objection statement in Kumarina, ASIC appears to have ignored breaches of s 606(1) of the Corporations Act. There is a pressing need for ASIC to clarify its position and, in particular, whether or not it will provide a no objection statement in respect of future transfer schemes where a bidder (or its parent company) votes at the scheme meeting.
Resumo:
The wave of democratisation across Europe, Africa, Asia and Latin America in the early 1990s triggered an increase in donor funding to media assistance initiatives, primarily within good governance policy frameworks. However, few media assistance projects have managed to effectively evaluate the impacts of their work. This thesis explores how the impacts of Australian media assistance on social change and governance can be most effectively evaluated and understood. The findings of this research suggest the importance of early investment in participatory planning of evaluation designs, which are then periodically revisited. These evaluation designs should be based on a theoretically sound link between models of change, evaluative questions and methods.
Resumo:
This paper aims to contribute to the literature about boundary crossing and explicate how boundaries carry learning potential. We aim to do this by theorising the work of school-based researchers (SBRs) in a school–university partnership project aimed at addressing issues of educational disadvantage. We conceptualise the worlds of teaching and research as characterised by different types of knowledge work and ways of knowing, and by different interaction rituals and emotional investments for engaging with that knowledge. Yet we also contend that the practice boundary that separates also connects and intertwines, as people, objects and knowledge move back and forth across it and become transformed in the process. We suggest that the kind of transformative knowledge work discussed in this paper entails understanding the power and control relations involved in recontextualising knowledge as it moves across the research–practice gap. This process necessitates recognising and acknowledging the emotional investments, energies and interaction rituals attached to local, domain specific knowledge and ways of knowing. By discussing the work of school-based researchers we aim to show how processes of recontextualisation at the boundary between researcher and practitioner knowledge can hold the potential to make a difference to issues of seemingly entrenched educational disadvantage.
Resumo:
Electrical resistivity of soils and sediments is strongly influenced by the presence of interstitial water. Taking advantage of this dependency, electrical-resistivity imaging (ERI) can be effectively utilized to estimate subsurface soil-moisture distributions. The ability to obtain spatially extensive data combined with time-lapse measurements provides further opportunities to understand links between land use and climate processes. In natural settings, spatial and temporal changes in temperature and porewater salinity influence the relationship between soil moisture and electrical resistivity. Apart from environmental factors, technical, theoretical, and methodological ambiguities may also interfere with accurate estimation of soil moisture from ERI data. We have examined several of these complicating factors using data from a two-year study at a forest-grassland ecotone, a boundary between neighboring but different plant communities.At this site, temperature variability accounts for approximately 20-45 of resistivity changes from cold winter to warm summer months. Temporal changes in groundwater conductivity (mean=650 S/cm =57.7) and a roughly 100-S/cm spatial difference between the forest and grassland had only a minor influence on the moisture estimates. Significant seasonal fluctuations in temperature and precipitation had negligible influence on the basic measurement errors in data sets. Extracting accurate temporal changes from ERI can be hindered by nonuniqueness of the inversion process and uncertainties related to time-lapse inversion schemes. The accuracy of soil moisture obtained from ERI depends on all of these factors, in addition to empirical parameters that define the petrophysical soil-moisture/resistivity relationship. Many of the complicating factors and modifying variables to accurately quantify soil moisture changes with ERI can be accounted for using field and theoretical principles.
Resumo:
This paper is concerned with how refugee stories can be used as the means of exploring values and developing intercultural understanding in the English classroom. To illustrate this possibility, André Dao’s (2005) Vuot Bien – The Search for Freedom: Huong Thi Nguen’s Story, about the impact of war and oppression on people’s lives, together with the experience of seeking freedom and acceptance in Australia as a Vietnamese refugee, is selected as the text for a Year 9 English class. In examining the features of this short story, we also consider how recent efforts to foster intercultural understanding in the new national curriculum in Australia might be advanced in the English classroom. We argue that this text and others in the genre of refugee narratives written by young people, provide vicarious opportunities to analyse how valuing freedom and having the courage to seek it can be brought to light when an individual survives one life and begins the challenges of creating a new life among strangers. Examining the values dimensions of such texts also allows young people to unpack and critique the ways in which cultural experiences, including their own, shape and form identities and how engaging with the experiences of others can be the vehicle for valuing difference. We hope our discussion might encourage teachers in other countries undergoing cultural shifts in response to the movements of people will be encouraged to consider this ‘double entendre’ in which the refugee experience is shaped not only by ‘the journey’ and also by ‘the arrival’ and the degree to which newcomers, refugee or asylum seekers, are made welcome by the receiving community.
Resumo:
A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.
Resumo:
In this paper, we derive a new nonlinear two-sided space-fractional diffusion equation with variable coefficients from the fractional Fick’s law. A semi-implicit difference method (SIDM) for this equation is proposed. The stability and convergence of the SIDM are discussed. For the implementation, we develop a fast accurate iterative method for the SIDM by decomposing the dense coefficient matrix into a combination of Toeplitz-like matrices. This fast iterative method significantly reduces the storage requirement of O(n2)O(n2) and computational cost of O(n3)O(n3) down to n and O(nlogn)O(nlogn), where n is the number of grid points. The method retains the same accuracy as the underlying SIDM solved with Gaussian elimination. Finally, some numerical results are shown to verify the accuracy and efficiency of the new method.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.
Resumo:
This paper explores a key issue identified in two studies of factors influencing the success of international and culturally and linguistically diverse (CALD) higher degree research graduate students. The studies include “A model for research supervision of international students in engineering and information technology disciplines” (MRS), which focused on identifying factors that influence successful supervision of culturally and linguistically diverse (CALD) and international higher degree research (HDR or graduate) students in Engineering and IT disciplines in three Australian universities, and “Culture, language and the whole graduate experience: Exploring best practices in international graduate supervision” (BPS), which focussed on exploring perceptions regarding best practices in graduate supervision by diverse stakeholders across Australia. Findings suggest most supervisors do not differentiate between international (or CALD) graduate students and non-CALD(domestic) students in terms of factors influence success in graduate studies.
Resumo:
The concept nursing grand rounds (NGR) has been reported in the nursing literature since the 1960s. Many of the reported initiatives are based on a presentation forum in the manner of medical grand rounds, as an approach to undergraduate education, or as a means to monitor patients. Among the points of difference in the design of the pilot project undertaken in a busy surgical ward to investigate the effectiveness of NGR in increasing nurses work satisfaction was the inclusion of the nursing librarian as an integral part of the NGR team and processes which previously has not reported in the literature. The nursing librarian’s role was to search the literature and find the best evidence on the predetermined patient topic prior to the NGR to enable the nurse presenting to integrate the research findings into the presentation of the patient. The nursing librarian attended each NGR and commented where appropriate on the level of evidence. Nurses discussed current practice and the impact the retrieved literature would have on patient care comparing best practice with current practice. Outcomes of this project include in some cases change in practice, change in culture where NGRs are now embedded into ward culture, NGR extended to other wards, enthusiasm for EBP, the initiation of a “super searcher” model where the nursing librarian is more of a consultant and develops the searching skills of nominated nurses who become the resource on the ward.