863 resultados para Ershov hierarchy
Resumo:
Purpose: There is a lack of theory relating to destination brand performance measurement in the destination branding literature, which emerged in the late 1990s (see for example Dosen, Vransevic, & Prebezac, 1998). Additionally, there is a lack of research about the importance of travel context in consumers’ destination decision making (Hu & Ritchie, 1993). This study develops a structural model to measure destination brand performance across different travel situations. The theory of planned behaviour (TpB) was utilised as a framework to underpin the consumer-based brand equity (CBBE) hierarchy to develop a model of destination brand performance. Research approach: A proposed model of destination brand performance was developed through a review of the literature. The first study was used to identify destination image attributes (the core construct) using an analysis of the literature, a document analysis, and personal interviews using the Repertory Test qualitative technique. Underpinned by Personal Construct Theory (PCT), the Repertory Test enables the elicitation of attributes consumers use to evaluate destinations when considering travel. Data was examined in the first study to i) identify any attribute differences in travel contexts and ii) create a scale for use in a questionnaire. A second study was conducted to test the proposed model using a questionnaire with eight groups of participants to assess four destinations across two travel contexts. The model was tested utilising structural equation modelling. Findings: The first study resulted in a list of 29 destination image attributes for use in a scale index. Attributes were assessed across travel contexts and few differences were identified. The second study assessed the congruence of destination brand identity (the destination marketing organisation’s desired image) and destination brand image (the actual perceptions held by consumers) using importance-performance analyses. Finally, the proposed model of destination brand performance was tested. Overall the data supported the model of destination brand performance across travel contexts and destinations. Additionally, this was compared to consumers’ decision sets, further supporting the model. Value: This research provides a contribution to the destination marketing literature through the development of a measurement of destination brand performance underpinned by TpB. Practically; it will provide destination marketing organisations with a tool to track destination brand performance, relative to key competing places, over time. This is important given the development of a destination brand is a long term endeavour.
Resumo:
Background/Aims Timely access to appropriate cardiac care is critical for optimizing positive outcomes after a cardiac event. Attendance at cardiac rehabilitation (CR) remains less than optimal (10%–30%). Our aim was to derive an objective, comparable, geographic measure reflecting access to cardiac services after a cardiac event in Australia. Methods An expert panel defined a single patient care pathway and a hierarchy of the minimum health services for CR and secondary prevention. Using geographic information systems a numeric/alpha index was modelled to describe access before and after a cardiac event. The aftercare phase was modelled into five alphabetical categories: from category A (access to medical service, pharmacy, CR, pathology within 1 h) to category E (no services available within 1 h). Results Approximately 96% or 19 million people lived within 1 h of the four basic services to support CR and secondary prevention, including 96% of older Australians and 75% of the indigenous population. Conversely, 14% (64,000) indigenous people resided in population locations that had poor access to health services that support CR after a cardiac event. Conclusion Results demonstrated that the majority of Australians had excellent ‘geographic’ access to services to support CR and secondary prevention. Therefore, it appears that it is not the distance to services that affects attendance. Our ‘geographic’ lens has identified that more research on socioeconomic, sociological or psychological aspects to attendance is needed.
Resumo:
Background/Aims Timely access to appropriate cardiac care is critical for optimizing positive outcomes after a cardiac event. Attendance at cardiac rehabilitation (CR) remains less than optimal (10%–30%). Our aim was to derive an objective, comparable, geographic measure reflecting access to cardiac services after a cardiac event in Australia. Methods An expert panel defined a single patient care pathway and a hierarchy of the minimum health services for CR and secondary prevention. Using geographic information systems a numeric/alpha index was modelled to describe access before and after a cardiac event. The aftercare phase was modelled into five alphabetical categories: from category A (access to medical service, pharmacy, CR, pathology within 1 h) to category E (no services available within 1 h). Results Approximately 96% or 19 million people lived within 1 h of the four basic services to support CR and secondary prevention, including 96% of older Australians and 75% of the indigenous population. Conversely, 14% (64,000) indigenous people resided in population locations that had poor access to health services that support CR after a cardiac event. Conclusion Results demonstrated that the majority of Australians had excellent ‘geographic’ access to services to support CR and secondary prevention. Therefore, it appears that it is not the distance to services that affects attendance. Our ‘geographic’ lens has identified that more research on socioeconomic, sociological or psychological aspects to attendance is needed.
Resumo:
Oral squamous cell carcinomas (OSCC) often arise from dysplastic lesions. The role of cancer stem cells in tumour initiation is widely accepted, yet the potential existence of pre-cancerous stem cells in dysplastic tissue has received little attention. Cell lines from oral diseases ranging in severity from dysplasia to malignancy provide opportunity to investigate the involvement of stem cells in malignant progression from dysplasia. Stem cells are functionally defined by their ability to generate hierarchical tissue structures in consortium with spatial regulation. Organotypic cultures readily display tissue hierarchy in vitro; hence, in this study, we compared hierarchical expression of stem cell-associated markers in dermis-based organotypic cultures of oral epithelial cells from normal tissue (OKF6-TERT2), mild dysplasia (DOK), severe dysplasia (POE-9n) and OSCC (PE/CA P J15). Expression of CD44, p75NTR, CD24 and ALDH was studied in monolayers by flow cytometry and in organotypic cultures by immunohistochemistry. Spatial regulation of CD44 and p75NTR was evident for organotypic cultures of normal (OKF6-TERT2) and dysplasia (DOK and POE-9n) but was lacking for OSCC (PE/CA PJ15)-derived cells. Spatial regulation of CD24 was not evident. All monolayer cultures exhibited CD44, p75NTR, CD24 antigens and ALDH activity (ALDEFLUOR® assay), with a trend towards loss of population heterogeneity that mirrored disease severity. In monolayer, increased FOXA1 and decreased FOXA2 expression correlated with disease severity, but OCT3/4, Sox2 and NANOG did not. We conclude that dermis-based organotypic cultures give opportunity to investigate the mechanisms that underlie loss of spatial regulation of stem cell markers seen with OSCC-derived cells.
Resumo:
Abstract. For interactive systems, recognition, reproduction, and generalization of observed motion data are crucial for successful interaction. In this paper, we present a novel method for analysis of motion data that we refer to as K-OMM-trees. K-OMM-trees combine Ordered Means Models (OMMs) a model-based machine learning approach for time series with an hierarchical analysis technique for very large data sets, the K-tree algorithm. The proposed K-OMM-trees enable unsupervised prototype extraction of motion time series data with hierarchical data representation. After introducing the algorithmic details, we apply the proposed method to a gesture data set that includes substantial inter-class variations. Results from our studies show that K-OMM-trees are able to substantially increase the recognition performance and to learn an inherent data hierarchy with meaningful gesture abstractions.
Resumo:
Modelling video sequences by subspaces has recently shown promise for recognising human actions. Subspaces are able to accommodate the effects of various image variations and can capture the dynamic properties of actions. Subspaces form a non-Euclidean and curved Riemannian manifold known as a Grassmann manifold. Inference on manifold spaces usually is achieved by embedding the manifolds in higher dimensional Euclidean spaces. In this paper, we instead propose to embed the Grassmann manifolds into reproducing kernel Hilbert spaces and then tackle the problem of discriminant analysis on such manifolds. To achieve efficient machinery, we propose graph-based local discriminant analysis that utilises within-class and between-class similarity graphs to characterise intra-class compactness and inter-class separability, respectively. Experiments on KTH, UCF Sports, and Ballet datasets show that the proposed approach obtains marked improvements in discrimination accuracy in comparison to several state-of-the-art methods, such as the kernel version of affine hull image-set distance, tensor canonical correlation analysis, spatial-temporal words and hierarchy of discriminative space-time neighbourhood features.
Resumo:
Queensland fruit fly, Bactrocera tryoni (Froggatt), is a polyphagous pest, and many citrus types are included among its hosts. While quantification of citrus host use by B. tryoni is lacking, citrus is generally considered a ‘low pressure’ crop. This paper investigates B. tryoni female oviposition preference and offspring performance in five citrus types; Murcott mandarin (Citrus reticulata), Navel orange and Valencia orange (Citrus sinensis), Eureka lemon (Citrus limon) and yellow grapefruit (Citrus paradisi). Oviposition preference was investigated in laboratory-based choice and no-choice experiments, while immature survival and offspring performance were investigated by infesting fruits in the laboratory and evaluating pupal recovery, pupal emergence and F1 fecundity. Fruit size, Brix level and peel toughness were also measured for correlation with host use. Bactrocera tryoni demonstrated an oviposition preference hierarchy among the citrus fruits tested; Murcott and grapefruit were most preferred for oviposition and lemon the least, while preference for Navel and Valencia was intermediate. Peel toughness was negatively correlated with B. tryoni oviposition preference, while no significant correlations were detected between oviposition and Brix level or fruit size. Immature survival in the tested fruit was very low. Murcott was the best host (21% pupal recovery), while all other citrus types that showed pupal recovery of 6% or lower and no pupae were recovered from Valencia orange. In pupae recovered from Navel orange and lemon, adult eclosion was greatly reduced, while in grapefruit and lemon, no eggs were recovered from F1 adults. Based on these laboratory results, many commercial citrus varieties appear to be poor hosts for B. tryoni and may pose a low post-harvest and quarantine risk. These findings need to be confirmed in the field, as they impact on both pre-harvest and post-harvest countermeasures.
Resumo:
Purpose – The purpose of this paper is to provide a new type of entry mode decision-making model for construction enterprises involved in international business. Design/methodology/approach – A hybrid method combining analytic hierarchy process (AHP) with preference ranking organization method for enrichment evaluations (PROMETHEE) is used to aid entry mode decisions. The AHP is used to decompose the entry mode problem into several dimensions and determine the weight of each criterion. In addition, PROMETHEE method is used to rank candidate entry modes and carry out sensitivity analyses. Findings – The proposed decision-making method is demonstrated to be a suitable approach to resolve the entry mode selection decision problem. Practical implications – The research provides practitioners with a more systematic decision framework and a more precise decision method. Originality/value – The paper sheds light on the further development of entry strategies for international construction markets. It not only introduces a new decision-making model for entry mode decision making, but also provides a conceptual framework with five determinants for a construction company entry mode selection based on the unique properties of the construction industry.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.
Resumo:
This paper explores notions of harm in sex work discourse, highlighting the extent to which essentialist ideas of ‘good’ versus ‘bad’ sex have pervaded trafficking policy. In a comparative examination of Australian Parliamentary Inquiries and United States Congressional Hearings leading to the establishment of anti-trafficking policy, we identify the stories that have influenced legislators, and established a narrative of trafficking heavily dependent upon assumptions of the inherent harm of sex work. This narrative constructs a hierarchy of victimisation, which denies alternative discourses of why women migrate for sex work. We argue that it is not sexual commerce that is harmful, but pathological, systemic inequalities and entrenched disadvantage that are harmful. A narrow narrative of trafficking fails to adequately depict this complexity of the trafficked experience.
Resumo:
This paper focuses on very young students' ability to engage in repeating pattern tasks and identifying strategies that assist them to ascertain the structure of the pattern. It describes results of a study which is part of the Early Years Generalising Project (EYGP) and involves Australian students in Years 1 to 4 (ages 5-10). This paper reports on the results from the early years' cohort (Year 1 and 2 students). Clinical interviews were used to collect data concerning students' ability to determine elements in different positions when two units of a repeating pattern were shown. This meant that students were required to identify the multiplicative structure of the pattern. Results indicate there are particular strategies that assist students to predict these elements, and there appears to be a hierarchy of pattern activities that help students to understand the structure of repeating patterns.
Resumo:
Video presented as part of ACIS 2009 conference in Melbourne Australia. Movie showing the execution of a small prototype Hypbolic projection of a process model. Useful for the traversal of large process models, as the entire hierarchy can be visualised as a whole, maintaining a sense of context while moving through such complex topologies. Related ACIS Conference paper is at: http://eprints.qut.edu.au/29296/
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Understanding network traffic behaviour is crucial for managing and securing computer networks. One important technique is to mine frequent patterns or association rules from analysed traffic data. On the one hand, association rule mining usually generates a huge number of patterns and rules, many of them meaningless or user-unwanted; on the other hand, association rule mining can miss some necessary knowledge if it does not consider the hierarchy relationships in the network traffic data. Aiming to address such issues, this paper proposes a hybrid association rule mining method for characterizing network traffic behaviour. Rather than frequent patterns, the proposed method generates non-similar closed frequent patterns from network traffic data, which can significantly reduce the number of patterns. This method also proposes to derive new attributes from the original data to discover novel knowledge according to hierarchy relationships in network traffic data and user interests. Experiments performed on real network traffic data show that the proposed method is promising and can be used in real applications. Copyright2013 John Wiley & Sons, Ltd.
Resumo:
This research develops a new framework to be used as a tool for analysing and designing walkable communities. The literature review recognises the work of other researchers combining their findings with the theory of activity nodes and considers how a framework may be used on a more global basis. The methodology develops a set of criteria through the analysis of noted successful case studies and this is then tested against an area with very low walking rates in Brisbane, Australia. Results of the study suggest that as well as the accepted criteria of connectivity, accessibility, safety, security, and path quality further criteria in the form or planning hierarchy, activity nodes and climate mitigation could be added to allow the framework to cover a broader context. Of particular note is the development of the nodal approach, which allows simple and effective analysis of existing conditions, and may also prove effective as a tool for planning and design of walkable communities.