975 resultados para "manner"
Resumo:
In recent years, cities have shown increasing signs of environmental problems due to the negative impacts of urban activities. The degradation and depletion of natural resources, climate change, and development pressure on green areas have become major concerns for cities. In response to these problems, urban planning policies have shifted to a sustainable focus and authorities have begun to develop new strategies for improving the quality of urban ecosystems. An extremely important function of an urban ecosystem is to provide healthy and sustainable environments for both natural systems and communities. Therefore, ecological planning is a functional requirement in the establishment of sustainable built environment. With ecological planning, human needs are supplied while natural resources are used in the most effective and sustainable manner and ecological balance is sustained. Protecting human and environmental health, having healthy ecosystems, reducing environmental pollution and providing green spaces are just a few of the many benefits of ecological planning. In this context, this chapter briefly presents a short overview of the importance of the implementation of ecological planning into sustainable urban development. Furthermore, it presents a conceptual framework for a new methodology for developing sustainable urban ecosystems through ecological planning approach.
Resumo:
The problem of delays in the construction industry is a global phenomenon and the construction industry in Brunei Darussalam is no exception. The goal of all parties involved in construction projects – owners, contractors, engineers and consultants in either the public or private sector is to successfully complete the project on schedule, within planned budget, with the highest quality and in the safest manner. Construction projects are frequently influenced by either success factors that help project parties reach their goal as planned, or delay factors that stifle or postpone project completion. The purpose of this research is to identify success and delay factors which can help project parties reach their intended goals with greater efficiency. This research extracted seven of the most important success factors according to the literature and seven of the most important delay factors identified by project parties, and then examined correlations between them to determine which were the most influential in preventing project delays. This research uses a comprehensive literature review to design and conduct a survey to investigate success and delay factors and then obtain a consensus of expert opinion using the Delphi methodology to rank the most needed critical success factors for Brunei construction projects. A specific survey was distributed to owners, contractors and engineers to examine the most critical delay factors. A general survey was distributed to examine the correlation between the identified delay factors and the seven most important critical success factors selected. A consensus of expert opinion using the Delphi methodology was used to rank the most needed critical success factors for Brunei building construction. Data was collected and evaluated by statistical methods to identify the most significant causes of delay and to measure the strength and direction of the relationship between critical success factors and delay factors in order to examine project parties’ evaluation of projects’ critical success and delay factors, and to evaluate the influence of critical success factors on critical delay factors. A relative importance index has been used to determine the relative importance of the various causes of delays. A one and two-way analysis of variance (ANOVA) has been used to examine how the group or groups evaluated the influence of the critical success factors in avoiding or preventing each of the delay factors, and which success factors were perceived as most influential in avoiding or preventing critical delay factors. Finally the Delphi method, using consensus from an expert panel, was employed to identify the seven most critical success factors used to avoid the delay factors, and thereby improve project performance.
Resumo:
A new approach that is slowly replacing neoclassical models of economic growth and commodity based industrial activities, knowledge based urban development (KBUD) aims to provide opportunities for citiesw to foster knowledge creation, exchange and innovation, and is based on the concepts of both sustainable urban development and economic prosperity; sustainable uses and protection of natural resources are therefore integral parts of KBUD. As such, stormwater, which has been recognised as one of the main culprits of aquatic ecosystem pollution and as therefore a significant threat to the goal of sustainable urban development, needs to be managed in a manner that produces ecologically sound outcomes. Water sensitive urban design (WSUD) is one of the key responses to the need to better management urban stormwater runoff and supports KBUD by providing an alternative, innovative and effective strategy to traditional stormwater management.
Resumo:
This paper reports on a mathematics education research project centred on teachers’ pedagogical practices and capacity to assess Indigenous Australian students in a culture-fair manner. The project has been funded by the Australian Research Council Linkage program and is being conducted in seven Catholic and Independent primary schools in north Queensland. Our Industry Partners are Catholic Education and the Association of Independent Schools, Queensland. The study aims to provide greater understanding about how to build more equitable assessment practices to address the issue of underperforming Aboriginal and Torres Strait Islander (ATSI) students in regional and remote Australia. The goal is to identify ways forward by attending to culture-fair assessment practice. The research is exploring the attitudes, beliefs and responses of Indigenous students to assessment in the context of mathematics learning with particular focus on teacher knowledge in these educational settings in relation to the design of assessment tasks that are authentic and engaging for these students in an accountability context. This approach highlights how teachers need to distinguish the ‘funds of knowledge’ (González, Moll, Floyd Tenery, Rivera, Rendón, Gonzales & Amanti, 2008) that Indigenous students draw on and how teachers need to be culturally responsive in their pedagogy to open up curriculum and assessment practice to allow for different ways of knowing and being
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
In response to the growing proliferation of Business Process Management (BPM) in industry and the demand this creates for BPM expertise, universities across the globe are at various stages of incorporating knowledge and skills in their teaching offerings. However, there are still only a handful of institutions that offer specialized education in BPM in a systematic and in-depth manner. This article is based on a global educators’ panel discussion held at the 2009 European Conference on Information Systems in Verona, Italy. The article presents the BPM programs of five universities from Australia, Europe, Africa, and North America, describing the BPM content covered, program and course structures, and challenges and lessons learned. The article also provides a comparative content analysis of BPM education programs illustrating a heterogeneous view of BPM. The examples presented demonstrate how different courses and programs can be developed to meet the educational goals of a university department, program, or school. This article contributes insights on how best to continuously sustain and reshape BPM education to ensure it remains dynamic, responsive, and sustainable in light of the evolving and ever-changing marketplace demands for BPM expertise.
Resumo:
Seven endemic governance problems are shown to be currently present in governments around the globe and at any level of government as well (for example municipal, federal). These problems have their roots traced back through more than two thousand years of political, specifically ‘democratic’, history. The evidence shows that accountability, transparency, corruption, representation, campaigning methods, constitutionalism and long-term goals were problematic for the ancient Athenians as well as modern international democratisation efforts encompassing every major global region. Why then, given the extended time period humans have had to deal with these problems, are they still present? At least part of the answer to this question is that philosophers, academics and NGOs as well as MNOs have only approached these endemic problems in a piecemeal manner with a skewed perspective on democracy. Their works have also been subject to the ebbs and flows of human history which essentially started and stopped periods of thinking. In order to approach the investigation of endemic problems in relation to democracy (as the overall quest of this thesis was to generate prescriptive results for the improvement of democratic government), it was necessary to delineate what exactly is being written about when using the term ‘democracy’. It is common knowledge that democracy has no one specific definition or practice, even though scholars and philosophers have been attempting to create a definition for generations. What is currently evident, is that scholars are not approaching democracy in an overly simplified manner (that is, it is government for the people, by the people) but, rather, are seeking the commonalities that democracies share, in other words, those items which are common to all things democratic. Following that specific line of investigation, the major practiced and theoretical versions of democracy were thematically analysed. After that, their themes were collapsed into larger categories, at which point the larger categories were comparatively analysed with the practiced and theoretical versions of democracy. Four democratic ‘particles’ (selecting officials, law, equality and communication) were seen to be present in all practiced and theoretical democratic styles. The democratic particles fused with a unique investigative perspective and in-depth political study created a solid conceptualisation of democracy. As such, it is argued that democracy is an ever-present element of any state government, ‘democratic’ or not, and the particles are the bodies which comprise the democratic element. Frequency- and proximity-based analyses showed that democratic particles are related to endemic problems in international democratisation discourse. The linkages between democratic particles and endemic problems were also evident during the thematic analysis as well historical review. This ultimately led to the viewpoint that if endemic problems are mitigated the act may improve democratic particles which might strengthen the element of democracy in the governing apparatus of any state. Such may actively minimise or wholly displace inefficient forms of government, leading to a government specifically tailored to the population it orders. Once the theoretical and empirical goals were attained, this thesis provided some prescriptive measures which government, civil society, academics, professionals and/or active citizens can use to mitigate endemic problems (in any country and at any level of government) so as to improve the human condition via better democratic government.
Resumo:
Sports sponsorship increasingly provides organisations with the opportunity to reach their target audiences in a manner that facilitates engagement and encourages relationship development. This paper provides an Australian perspective of the value of sports sponsorship using a case study of WOW Sight and Sound’s long-term sponsorship of the Brisbane Broncos rugby league team. The case study investigates WOW’s marketing objectives which centre generating brand awareness using sponsorship with the Brisbane Broncos as an integrated marketing communications tool. WOW believes that the integration of its sponsorship of the Broncos with the team’s total marketing plan is integral to its success. This integration requires the facilitation of two-way communications between WOW, its advertising agency, the Brisbane Broncos and customers to ensure that all parties’ needs are met.
Resumo:
Social capital plays an important role in explaining how value is created from firms' network relationships, but little is understood about how social capital is shaped over time and how it is re-shaped when firms consolidate their network ties. In response, this study explores the evolution of social capital in buyer–supplier relationships through a case study of a company undertaking radical product innovation, and examines the corresponding changes in the firm's network of buyer–supplier relationships. The analysis shows that social capital is built in a decidedly non-linear and non-uniform manner. The study also reveals considerable interaction among the dimensions of social capital throughout the evolution of the firm's network, and emphasizes the importance of the cognitive dimension—a feature receiving little attention thus far. The evidence shows, too, that efforts to strengthen social capital need to increase when network ties are sacrificed to prevent unintended consequences for firms' longer-term value creation.
Resumo:
Background: Young motorists engaging in anti-social and often dangerous driving manoeuvres (which is often referred to as “hooning” within Australia) is an increasing road safety problem. While anecdotal evidence suggests that such behaviour is positively linked with crash involvement, researchers have yet to examine whether younger drivers who deliberately break road rules and drive in an erratic manner (usually with peers) are in fact over represented in crash statistics. This paper outlines research that aimed to identify the characteristics of individuals most likely to engaging in hooning behaviours, as well as examine the frequency of such driving behaviours and if such activity is linked with self-reported crash involvement.---------- Methods: A total of 717 young drivers in Queensland voluntarily completed a questionnaire to investigate their driving behaviour and crash history.---------- Results: Quantitative analysis of the data revealed that almost half the sample reported engaging in some form of “hooning” behaviour at least once in their lifetime, although only 4% indicated heavy participation in the behaviour e.g., >50 times. Street racing was the most common activity reported by participants followed by “drifting” and then “burnouts”. Logistic regression analysis indicated that being younger and a male was predictive of reporting such anti-social driving behaviours, and importantly, a trend was identified between such behaviour and self-reported crash involvement.---------- Conclusions: This research provides preliminary evidence that younger male drivers are more likely to engage in dangerous driving behaviours, which ultimately may prove to increase their overall risk of becoming involved in a crash. This paper will further outline the study findings in regards to current enforcement efforts to deter such driving activity as well as provide direction for future research efforts in this area.---------- Research highlights: ► The self-reported driving behaviours of 717 younger Queensland drivers were examined to investigate the relationship between deliberately breaking road rules and self-reported crash involvement. ► Younger male drivers were most likely to engage in such aberrant driving behaviours and a trend was identified between such behaviour and self-reported crash involvement.
Resumo:
This paper approaches its topic in a somewhat crabwise manner, but hopefully by that means it may succeed in reaching its objective without being eaten alive. It comprises a critique of a recent internet post called ‘The Shock of Inclusion’ by Clay Shirky (his contribution to The Edge World Question of 2010), in which he claims (among other things) that ‘the average quality of public thought has collapsed.’
Resumo:
This action research examines the enhancement of visual communication within the architectural design studio through physical model making. „It is through physical model making that designers explore their conceptual ideas and develop the creation and understanding of space,‟ (Salama & Wilkinson 2007:126). This research supplements Crowther‟s findings extending the understanding of visual dialogue to include physical models. „Architecture Design 8‟ is the final core design unit at QUT in the fourth year of the Bachelor of Design Architecture. At this stage it is essential that students have the ability to communicate their ideas in a comprehensive manner, relying on a combination of skill sets including drawing, physical model making, and computer modeling. Observations within this research indicates that students did not integrate the combination of the skill sets in the design process through the first half of the semester by focusing primarily on drawing and computer modeling. The challenge was to promote deeper learning through physical model making. This research addresses one of the primary reasons for the lack of physical model making, which was the limited assessment emphasis on the physical models. The unit was modified midway through the semester to better correlate the lecture theory with studio activities by incorporating a series of model making exercises conducted during the studio time. The outcome of each exercise was assessed. Tutors were surveyed regarding the model making activities and a focus group was conducted to obtain formal feedback from students. Students and tutors recognised the added value in communicating design ideas through physical forms and model making. The studio environment was invigorated by the enhanced learning outcomes of the students who participated in the model making exercises. The conclusions of this research will guide the structure of the upcoming iteration of the fourth year design unit.
Resumo:
Purpose. To investigate the clinical and subjective performance of asmofilcon A, a new third generation silicone hydrogel contact lens during 6-night extended wear (EW) over 6 months. Methods. A prospective, randomized, single-masked study was conducted. Sixty experienced daily wear soft contact lens wearers were randomly assigned to wear either asmofilcon A or senofilcon A contact lenses bilaterally for 6 months on an EW basis. Evaluations were conducted at contact lens delivery and after 1 week, 4 weeks, 3 and 6 months of EW. Results. Fifty subjects (83%) successfully completed the study. Two subjects experienced adverse events; one unilateral red eye with asmofilcon A and one asymptomatic infiltrate with senofilcon A. There were no significant differences in high or low contrast distance visual acuity between asmofilcon A and senofilcon A; however, low contrast distance visual acuity decreased significantly over time with both contact lens types (p < 0.05). The two lens types did not vary significantly with respect to any of the objective and subjective measures assessed (p > 0.05). Superior palpebral conjunctival injection showed a statistically significant increase over time with both lens types (p < 0.05). Both lens types were rated highly with respect to overall comfort, with subjects reporting 14 or 15 h of comfortable lens wearing time per day at each of the study visits (p > 0.05). Overall satisfaction ratings were also very high at all visits, with median scores of 95 (86 to 99) for asmofilcon A and 90 (85 to 96) for senofilcon A at 6 months (p > 0.05). Conclusions. Over 6 months of EW, the asmofilcon A contact lens performed in a similar manner to senofilcon A with respect to visual acuity, ocular health, and contact lens performance measures. Longer-term EW studies are required to investigate the changes over time observed with both lens types.
Resumo:
We aim to demonstrate unaided visual 3D pose estimation and map reconstruction using both monocular and stereo vision techniques. To date, our work has focused on collecting data from Unmanned Aerial Vehicles, which generates a number of significant issues specific to the application. Such issues include scene reconstruction degeneracy from planar data, poor structure initialisation for monocular schemes and difficult 3D reconstruction due to high feature covariance. Most modern Visual Odometry (VO) and related SLAM systems make use of a number of sensors to inform pose and map generation, including laser range-finders, radar, inertial units and vision [1]. By fusing sensor inputs, the advantages and deficiencies of each sensor type can be handled in an efficient manner. However, many of these sensors are costly and each adds to the complexity of such robotic systems. With continual advances in the abilities, small size, passivity and low cost of visual sensors along with the dense, information rich data that they provide our research focuses on the use of unaided vision to generate pose estimates and maps from robotic platforms. We propose that highly accurate (�5cm) dense 3D reconstructions of large scale environments can be obtained in addition to the localisation of the platform described in other work [2]. Using images taken from cameras, our algorithm simultaneously generates an initial visual odometry estimate and scene reconstruction from visible features, then passes this estimate to a bundle-adjustment routine to optimise the solution. From this optimised scene structure and the original images, we aim to create a detailed, textured reconstruction of the scene. By applying such techniques to a unique airborne scenario, we hope to expose new robotic applications of SLAM techniques. The ability to obtain highly accurate 3D measurements of an environment at a low cost is critical in a number of agricultural and urban monitoring situations. We focus on cameras as such sensors are small, cheap and light-weight and can therefore be deployed in smaller aerial vehicles. This, coupled with the ability of small aerial vehicles to fly near to the ground in a controlled fashion, will assist in increasing the effective resolution of the reconstructed maps.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.