874 resultados para Rauzy norm
Resumo:
Existing multi-model approaches for image set classification extract local models by clustering each image set individually only once, with fixed clusters used for matching with other image sets. However, this may result in the two closest clusters to represent different characteristics of an object, due to different undesirable environmental conditions (such as variations in illumination and pose). To address this problem, we propose to constrain the clustering of each query image set by forcing the clusters to have resemblance to the clusters in the gallery image sets. We first define a Frobenius norm distance between subspaces over Grassmann manifolds based on reconstruction error. We then extract local linear subspaces from a gallery image set via sparse representation. For each local linear subspace, we adaptively construct the corresponding closest subspace from the samples of a probe image set by joint sparse representation. We show that by minimising the sparse representation reconstruction error, we approach the nearest point on a Grassmann manifold. Experiments on Honda, ETH-80 and Cambridge-Gesture datasets show that the proposed method consistently outperforms several other recent techniques, such as Affine Hull based Image Set Distance (AHISD), Sparse Approximated Nearest Points (SANP) and Manifold Discriminant Analysis (MDA).
Resumo:
This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.
Resumo:
Since the severe acute respiratory syndrome outbreak in 2003, it has been argued that there has been a substantial revision to the norm dictating the behaviour of states in the event of a disease outbreak. This article examines the evolution of the norm to ‘report and verify’ disease outbreaks and evaluates the extent to which this revised norm has begun to guide state behaviour. Examination of select East Asian countries affected by human infections of the H5N1 (avian influenza) virus strain reveals the need to further understand the mutually constitutive relationship between the value attached to prompt reporting against the capacity to report, and how states manage both in fulfilling their duty to report.
Resumo:
"The Responsibility to Protect (R2P) is a major new international principle, adopted unanimously in 2005 by Heads of State and Government. Whilst it is broadly acknowledged that the principle has an important and intimate relationship with international law, especially the law relating to sovereignty, peace and security, human rights and armed conflict, there has yet to be a volume dedicated to this question. The Responsibility to Protect and International Law fills that gap by bringing together leading scholars from North America, Europe and Australia to examine R2P’s legal content. The Responsibility to Protect and International Law focuses on questions relating to R2P’s legal quality, its relationship with sovereignty, and the question of whether the norm establishes legal obligations. It also aims to introduce readers to different legal perspectives, including feminism, and pressing practical questions such as how the law might be used to prevent genocide and mass atrocities, and punish the perpetrators."--publisher website
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
Background Animal and human infection with multiple parasite species is the norm rather than the exception, and empirical studies and animal models have provided evidence for a diverse range of interactions among parasites. We demonstrate how an optimal control strategy should be tailored to the pathogen community and tempered by species-level knowledge of drug sensitivity with use of a simple epidemiological model of gastro-intestinal nematodes. Methods We construct a fully mechanistic model of macroparasite co-infection and use it to explore a range of control scenarios involving chemotherapy as well as improvements to sanitation. Results Scenarios are presented whereby control not only releases a more resistant parasite from antagonistic interactions, but risks increasing co-infection rates, exacerbating the burden of disease. In contrast, synergisms between species result in their becoming epidemiologically slaved within hosts, presenting a novel opportunity for controlling drug resistant parasites by targeting co-circulating species. Conclusions Understanding the effects on control of multi-parasite species interactions, and vice versa, is of increasing urgency in the advent of integrated mass intervention programmes.
Resumo:
We examined goal importance, focusing on high, but not exclusive priority goals, in the theory of planned behaviour (TPB) to predict students’ academic performance. At the beginning of semester, students in a psychology subject (N = 197) completed TPB and goal importance items for achieving a high grade. Regression analyses revealed partial support for the TPB. Perceived behavioural control, but not attitude or subjective norm, significantly predicted intention, with intention predicting final grade. Goal importance significantly predicted intention, but not final grade, indicating that perceiving a performance goal as highly, but not necessarily exclusively, important impacts on students’ achievement intentions.
Resumo:
Heliothine moths (Lepidoptera: Heliothinae) include some of the world's most devastating pest species. Whereas the majority of nonpest heliothinae specialize on a single plant family, genus, or species, pest species are highly polyphagous, with populations often escalating in size as they move from one crop species to another. Here, we examine the current literature on heliothine host-selection behavior with the aim of providing a knowledge base for research scientists and pest managers. We review the host relations of pest heliothines, with a particular focus on Helicoverpa armigera (Hubner), the most economically damaging of all heliothine species. We then consider the important question of what constitutes a host plant in these moths, and some of the problems that arise when trying to determine host plant status from empirical studies on host use. The top six host plant families in the two main Australian pest species (H. armigera and Helicoverpa punctigera Wallengren) are the same and the top three (Asteraceae, Fabaceae, and Malvaceae) are ranked the same (in terms of the number of host species on which eggs or larvae have been identified), suggesting that these species may use similar cues to identify their hosts. In contrast, for the two key pest heliothines in the Americas, the Fabaceae contains approximate to 1/3 of hosts for both. For Helicoverpa zea (Boddie), the remaining hosts are more evenly distributed, with Solanaceae next, followed by Poaceae, Asteraceae, Malvaceae, and Rosaceae. For Heliothis virescens (F.), the next highest five families are Malvaceae, Asteraceae, Solanaceae, Convolvulaceae, and Scrophulariaceae. Again there is considerable overlap in host use at generic and even species level. H. armigera is the most widely distributed and recorded from 68 plant families worldwide, but only 14 families are recorded as a containing a host in all geographic areas. A few crop hosts are used throughout the range as expected, but in some cases there are anomalies, perhaps because host plant relation studies are not comparable. Studies on the attraction of heliothines to plant odors are examined in the context of our current understanding of insect olfaction, with the aim of better understanding the connection between odor perception and host choice. Finally, we discuss research into sustainable management of pest heliothines using knowledge of heliothine behavior and ecology. A coordinated international research effort is needed to advance our knowledge on host relations in widely distributed polyphagous species instead of the localized, piecemeal approaches to understanding these insects that has been the norm to date.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
This study reports the construction and reconstruction of identities of new and existing employees during a significant transition phase of a nuclear engineering organization. We followed a group of new and existing employees over the period of three years, during which the organization constructed a greenfield nuclear facility with new generational technologies whilst in parallel, decommissioned the older reactor. This change led to the transfer and integration of existing trade-based employees with the newly recruited, primarily university educated graduates in the new site. Three waves of interview data were collected, in conjunction with the cognitive mapping of social grouping and photo elicitation portrayed the stories of different group of employees who either succeeded or failed at embracing their new professional identity. In contrast with the new recruits who constructed new identities as they join this organization, we identify and report on the number of enabling and disabling factors that influence the process of professional identity construction and reconstruction during gamma change.
Resumo:
Although the collection of player and ball tracking data is fast becoming the norm in professional sports, large-scale mining of such spatiotemporal data has yet to surface. In this paper, given an entire season's worth of player and ball tracking data from a professional soccer league (approx 400,000,000 data points), we present a method which can conduct both individual player and team analysis. Due to the dynamic, continuous and multi-player nature of team sports like soccer, a major issue is aligning player positions over time. We present a "role-based" representation that dynamically updates each player's relative role at each frame and demonstrate how this captures the short-term context to enable both individual player and team analysis. We discover role directly from data by utilizing a minimum entropy data partitioning method and show how this can be used to accurately detect and visualize formations, as well as analyze individual player behavior.
Resumo:
Objectives To address the scarcity of comprehensive, theory-based research in the Australian context, this study, using a theory of planned behaviour (TPB) framework, investigated the role of personal and social norms to identify the key predictors of adult Australians' sun-safe intentions and behaviour. Design The study used a prospective design with two waves of data collection, 1 week apart. Methods Participants were 816 adults (48.2% men) aged between 18 and 88 years recruited from urban, regional, and rural areas of Australia. At baseline, participants completed a questionnaire assessing the standard TPB predictors (attitude, subjective norm, and perceived behavioural control [PBC]), past behaviour, behavioural intention, and additional measures of group norm for the referent groups of friends and family, image norm, personal norm, personal choice/responsibility, and Australian identity. Seventy-one per cent of the participants (n = 577) reported on their sun-safe behaviour in the subsequent week. Results Via path modelling, past behaviour, attitude, group norm (friends), personal norm, and personal choice/responsibility emerged as independent predictors of intentions which, in turn, predicted sun-safe behaviour prospectively. Past behaviour, but not PBC, had direct effects on sun-safe behaviour. The model explained 61.6% and 43.9% of the variance in intention and behaviour, respectively. Conclusions This study provides support for the use of a comprehensive theoretical decision-making model to explain Australian adults' sun-safe intentions and behaviours and identifies viable targets for health-promoting messages in this high-risk context.
Resumo:
Cambodian accident statistics show that motivating motorcyclists to make proper use of a safety helmet is a top priority for road safety policy makers. Yet, currently there is no insight whatsoever in the psychological precursors of helmet use in Cambodia. As such, it remains unclear which variables to target by interventions aimed at promoting the use of safety helmets. Therefore, this study adopted a socio-cognitive perspective towards the examination of helmet use in a sample of Cambodian young adults (N = 344). Two theoretical models, i.e., Health Belief Model and Theory of Planned Behaviour were combined and further complemented with two norm-related variables, i.e., descriptive- and personal norm. Based on the results, two important conclusions can be drawn. Firstly, the sample investigated in this study is clearly favourably disposed towards the use of helmets while riding. Secondly, in decreasing order, helmet use behaviour was found to be determined by the following five key-determinants: perceived behavioural control over a specific set of inhibiting situational factors (i.e., mostly when driving short distances, at night, or when dressed up to go out), perceived behavioural control in general, perceived susceptibility, personal norm, and behavioural intentions. Policy makers are recommended to reevaluate their current behavioural change methods for young adults being favourably disposed towards the use of safety helmets. Rather than focussing on motivation-oriented methods, there is a need for strategies that (1) stimulate the translation of good intentions into the desirable behaviour and (2) encourage young adults not to relapse in case they are exposed to risk facilitating circumstances. These implications will be discussed more in detail.
Resumo:
Purpose Using the Theory of Planned Behaviour (TPB) framework, this study explored whether the standard TPB constructs explained variance in Gen Y individuals’ intentions to join their ideal organisation. Design/methodology/approach A mixed methods approach was used featuring qualitative and quantitative methods. Findings The overall TPB model accounted for a significant 51.6% of the variance in intention to join one’s ideal organisation in the next six months with the significant predictors in the model being subjective norm and perceived behaviour control but not attitude. Research limitations/implications Using graduating students from a single Australian university sample may mean that the current findings may not extend to all Gen Y individuals. The current study has demonstrated the explanatory utility of the TPB in relation to graduate Gen Y’s intention to join their ideal organisation, providing further evidence of the robustness of the TPB framework in an organisational setting. Practical implications These findings have implications for enhancing understanding of the most effective recruitment processes for Gen Y students entering the workforce. The findings could inform recruitment policies and strategies to attract Gen Y applicants. Originality/value To our knowledge this study is the first application of the TPB to this topic. The current research extends the recruitment literature with a theoretically-based investigation. Identification of factors which inform organisational recruitment strategies, allow organisations to stand out from their competitors and potentially achieve a larger application pool from which to select the best human capital and sustain competitive advantage.
Resumo:
Objective. To evaluate the effectiveness of a single-session online theory of planned behaviour (TPB)-based intervention to improve sun-protective attitudes and behaviour among Australian adults. Methods. Australian adults (N = 534; 38.7% males; Mage = 39.3 years) from major cities (80.9%), regional (17.6%) and remote areas (1.5%)were recruited and randomly allocated to an intervention (N=265) and information only group (N = 267). The online intervention focused on fostering positive attitudes, perceptions of normative support, and control perceptions for sun protection. Participants completed questionnaires assessing standard TPB measures (attitude, subjective norm, perceived behavioural control, intention, behaviour) and extended TPB constructs of group norm (friends, family), personal norm, and image norm, pre-intervention (Time 1) and one week (Time 2) and one month post-intervention (Time 3). Repeated Measures Multivariate Analysis of Variance tested intervention effects across time. Results. Intervention participants reported more positive attitudes towards sun protection and used sunprotective measures more often in the subsequent month than participants receiving information only. The intervention effects on control perceptions and norms were non-significant. Conclusions. A theory-based online intervention fostering more favourable attitudes towards sun safety can increase sun protection attitudes and self-reported behaviour among Australian adults in the short term.