915 resultados para Copyright exceptions and limitations
Resumo:
This study examined consumers' attitude toward the use of sexual content in advertisements among there different cultural groups; i.e., individualistic sample (White American), collectivistic sample (US temporal visitors from Asia), and acculturation sample (Asian immigrants). Sixty participants were asked about cultural acceptability of sexual content ads and the favorable attitude toward those ads by using Q-methodology. Asian participants reported less cultural acceptability for sexuality, than either Asian American or North American participants. The findings also revealed that North Americans are more likely to prefer the use of sexual content in advertisement than Asians. Asian-American participants agreed with North American participants in regard to sexually explicit advertising. Implications and limitations were discussed.
Resumo:
Biased estimation has the advantage of reducing the mean squared error (MSE) of an estimator. The question of interest is how biased estimation affects model selection. In this paper, we introduce biased estimation to a range of model selection criteria. Specifically, we analyze the performance of the minimum description length (MDL) criterion based on biased and unbiased estimation and compare it against modern model selection criteria such as Kay's conditional model order estimator (CME), the bootstrap and the more recently proposed hook-and-loop resampling based model selection. The advantages and limitations of the considered techniques are discussed. The results indicate that, in some cases, biased estimators can slightly improve the selection of the correct model. We also give an example for which the CME with an unbiased estimator fails, but could regain its power when a biased estimator is used.
Resumo:
"Know How" protection varies enormously from country to country and is a complex equation of legal, political, cultural and economic factors. A contrast between Japan and Australia serves to highlight some of these factors. For the purposes of this article, a working definition of "know how" is required. In Australia and other common law systems, no statutory definition of "know how" exists, "confidential information" proving the closest comparative term in Australia ('trade secret law' in the United States).
Resumo:
This Chapter provides an overview of available corrent data measuring crime in Australia's States and Territories broken down into regions and localities The data is limited, has reliability problems and lots of gaps. Nevertheless when the data are analysed according to offence type (in particulary violence versus property offences) an interesting but complicated empirical picture emerges that departs from what most scholars and policy makes have commonly assumed about crime and rural communities - that there is not much of it! The chapter begins with an assessment of the uses and limitations of different ways of measuring crime for those interested in a spatialised analysis of crome dispersion in rural communities.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
As Web searching becomes more prolific for information access worldwide, we need to better understand users’ Web searching behaviour and develop better models of their interaction with Web search systems. Web search modelling is a significant and important area of Web research. Searching on the Web is an integral element of information behaviour and human–computer interaction. Web searching includes multitasking processes, the allocation of cognitive resources among several tasks, and shifts in cognitive, problem and knowledge states. In addition to multitasking, cognitive coordination and cognitive shifts are also important, but are under-explored aspects of Web searching. During the Web searching process, beyond physical actions, users experience various cognitive activities. Interactive Web searching involves many users’ cognitive shifts at different information behaviour levels. Cognitive coordination allows users to trade off the dependences among multiple information tasks and the resources available. Much research has been conducted into Web searching. However, few studies have modelled the nature of and relationship between multitasking, cognitive coordination and cognitive shifts in the Web search context. Modelling how Web users interact with Web search systems is vital for the development of more effective Web IR systems. This study aims to model the relationship between multitasking, cognitive coordination and cognitive shifts during Web searching. A preliminary theoretical model is presented based on previous studies. The research is designed to validate the preliminary model. Forty-two study participants were involved in the empirical study. A combination of data collection instruments, including pre- and post-questionnaires, think-aloud protocols, search logs, observations and interviews were employed to obtain users’ comprehensive data during Web search interactions. Based on the grounded theory approach, qualitative analysis methods including content analysis and verbal protocol analysis were used to analyse the data. The findings were inferred through an analysis of questionnaires, a transcription of think-aloud protocols, the Web search logs, and notes on observations and interviews. Five key findings emerged. (1) Multitasking during Web searching was demonstrated as a two-dimensional behaviour. The first dimension was represented as multiple information problems searching by task switching. Users’ Web searching behaviour was a process of multiple tasks switching, that is, from searching on one information problem to searching another. The second dimension of multitasking behaviour was represented as an information problem searching within multiple Web search sessions. Users usually conducted Web searching on a complex information problem by submitting multiple queries, using several Web search systems and opening multiple windows/tabs. (2) Cognitive shifts were the brain’s internal response to external stimuli. Cognitive shifts were found as an essential element of searching interactions and users’ Web searching behaviour. The study revealed two kinds of cognitive shifts. The first kind, the holistic shift, included users’ perception on the information problem and overall information evaluation before and after Web searching. The second kind, the state shift, reflected users’ changes in focus between the different cognitive states during the course of Web searching. Cognitive states included users’ focus on the states of topic, strategy, evaluation, view and overview. (3) Three levels of cognitive coordination behaviour were identified: the information task coordination level, the coordination mechanism level, and the strategy coordination level. The three levels of cognitive coordination behaviour interplayed to support multiple information tasks switching. (4) An important relationship existed between multitasking, cognitive coordination and cognitive shifts during Web searching. Cognitive coordination as a management mechanism bound together other cognitive processes, including multitasking and cognitive shifts, in order to move through users’ Web searching process. (5) Web search interaction was shown to be a multitasking process which included information problems ordering, task switching and task and mental coordinating; also, at a deeper level, cognitive shifts took place. Cognitive coordination was the hinge behaviour linking multitasking and cognitive shifts. Without cognitive coordination, neither multitasking Web searching behaviour nor the complicated mental process of cognitive shifting could occur. The preliminary model was revisited with these empirical findings. A revised theoretical model (MCC Model) was built to illustrate the relationship between multitasking, cognitive coordination and cognitive shifts during Web searching. Implications and limitations of the study are also discussed, along with future research work.
Resumo:
In this study, the feasibility of difference imaging for improving the contrast of electronic portal imaging device (EPID) images is investigated. The difference imaging technique consists of the acquisition of two EPID images (with and without the placement of an additional layer of attenuating medium on the surface of the EPID)and the subtraction of one of these images from the other. The resulting difference image shows improved contrast, compared to a standard EPID image, since it is generated by lower-energy photons. Results of this study show that, ¯rstly, this method can produce images exhibiting greater contrast than is seen in standard megavoltage EPID images and that, secondly, the optimal thickness of attenuating material for producing a maximum contrast enhancement may vary with phantom thickness and composition. Further studies of the possibilities and limitations of the di®erence imaging technique, and the physics behind it, are therefore recommended.
Resumo:
Architecture for a Free Subjectivity reformulates the French philosopher Gilles Deleuze's model of subjectivity for architecture, by surveying the prolific effects of architectural encounter, and the spaces that figure in them. For Deleuze and his Lacanian collaborator Félix Guattari, subjectivity does not refer to a person, but to the potential for and event of matter becoming subject, and the myriad ways for this to take place. By extension, this book theorizes architecture as a self-actuating or creative agency for the liberation of purely "impersonal effects." Imagine a chemical reaction, a riot in the banlieues, indeed a walk through a city. Simone Brott declares that the architectural object does not merely take part in the production of subjectivity, but that it constitutes its own.
Resumo:
For decades, the development, construction, track ownership and operation of mainline railways in China have been overseen by the state-owned authorities. From mid-90’s, the mainline railway management has undergone revamps to revitalize the intra-modal competitiveness of railway transportation and to steer it toward the direction of modern business management. With the rapid economic growth; the large-scale expansion of the mainline network; and the increasing expectation on service, the mainline railways in China require further restructuring. Inevitably, a sustainable approach to ensure business viability and service quality in the next few decades is an imminent challenge. This paper reviews the operations and management of mainline railway in China and discusses the possibility of introducing open access market. Drawing the experiences on railway open markets outside China, the discussions include the need and feasibility of railway open market in China; and the suitability and limitations of different models. Particular considerations will be given to the unique characteristics of the mainline railways in China, where the developments across neighbouring regions are unbalanced; freight and passenger services are of similar demands; and the high-speed train operations are operated with low-speed ones in mixed traffic.
Resumo:
This chapter explores the perceptions of middle years specialist teachers in the contemporary Australian schools context. Written narratives were obtained from 4 Australian teachers. Each has followed distinctly different paths to teaching in the middle years. However, each has a high leadership profile in the general schooling sector assumed relatively early in their professional careers. These teachers were asked about their entry into teaching, the pathways they pursued to teaching at the middle level, opportunities and limitations experienced for them in schools, and their conceptions of the future of middle years reforms in Australia.
Resumo:
In a seminal data mining article, Leo Breiman [1] argued that to develop effective predictive classification and regression models, we need to move away from the sole dependency on statistical algorithms and embrace a wider toolkit of modeling algorithms that include data mining procedures. Nevertheless, many researchers still rely solely on statistical procedures when undertaking data modeling tasks; the sole reliance on these procedures has lead to the development of irrelevant theory and questionable research conclusions ([1], p.199). We will outline initiatives that the HPC & Research Support group is undertaking to engage researchers with data mining tools and techniques; including a new range of seminars, workshops, and one-on-one consultations covering data mining algorithms, the relationship between data mining and the research cycle, and limitations and problems with these new algorithms. Organisational limitations and restrictions to these initiatives are also discussed.
Resumo:
My overall contention is that from Mark Latham to Grogsgate, from Tony’s speedos to Julia’s treasonous lack of handbags, Australian political journalism hasn’t exactly wowed us with the quality of its coverage these past months – with ample help, it should be noted, from the two sides of politics and the respective small target strategies themselves. Tim Dunlop has gone as far as to suggest that during the election we’ve seen politics and the media locked in a death spiral (http://www.abc.net.au/unleashed/35594.html) – an observation we might want to take up in the panel discussion – but even without the dramatic language the overall tendency has been that of a race to the bottom in the quality of political discourse in this country, with very few exceptions. And as a result, trust in journalism – the professional esteem in which journalists are held by their audiences – has been steadily declining for some time. Australian journalists are hardly alone in this, of course: this decline is a dynamic which has been observed in many other nations, too.
Resumo:
This brief presentation considered the possibilities and limitations of strategies to promote electronic democracy pursued so far. In particular it indicated that the problems encountered have only been in part due to technological limitations or even a lack of political will. The stronger set of issues concerns the question of 'why participate?', and how to best facilitate this. The capacity to extent the principals of deliberative democracy through online media is briefly canvassed in the presentation.
Resumo:
Live coding performances provide a context with particular demands and limitations for music making. In this paper we discuss how as the live coding duo aa-cell we have responded to these challenges, and what this experience has revealed about the computational representation of music and approaches to interactive computer music performance. In particular we have identified several effective and efficient processes that underpin our practice including probability, linearity, periodicity, set theory, and recursion and describe how these are applied and combined to build sophisticated musical structures. In addition, we outline aspects of our performance practice that respond to the improvisational, collaborative and communicative requirements of musical live coding.
Resumo:
Bridges are valuable assets of every nation. They deteriorate with age and often are subjected to additional loads or different load patterns than originally designed for. These changes in loads can cause localized distress and may result in bridge failure if not corrected in time. Early detection of damage and appropriate retrofitting will aid in preventing bridge failures. Large amounts of money are spent in bridge maintenance all around the world. A need exists for a reliable technology capable of monitoring the structural health of bridges, thereby ensuring they operate safely and efficiently during the whole intended lives. Monitoring of bridges has been traditionally done by means of visual inspection. Visual inspection alone is not capable of locating and identifying all signs of damage, hence a variety of structural health monitoring (SHM) techniques is used regularly nowadays to monitor performance and to assess condition of bridges for early damage detection. Acoustic emission (AE) is one technique that is finding an increasing use in SHM applications of bridges all around the world. The chapter starts with a brief introduction to structural health monitoring and techniques commonly used for monitoring purposes. Acoustic emission technique, wave nature of AE phenomenon, previous applications and limitations and challenges in the use as a SHM technique are also discussed. Scope of the project and work carried out will be explained, followed by some recommendations of work planned in future.