991 resultados para Tindal, Matthew, 1653?-1733


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To examine the views of rural practitioners concerning issues and challenges in mental health service delivery and possible solutions. Design: A qualitative study using individual semi-structured interviews. Setting: Eight general practices from eight rural Queensland towns, three rural mental health services and two non-government organisations, with interviews being conducted before recent changes in government-subsidised access to allied health practitioners. Participants: A sample of 37 GPs, 19 Queensland Health mental health staff and 18 participants from community organisations. Main outcome measures: Analysis of qualitative themes from questions about the key mental health issues facing the town, bow they might be addressed and what challenges would be faced in addressing them. Results: There was substantial consensus that there are significant problems with inter-service communication and liaison, and that improved collaboration and shared care will form a critical part of any effective solution. Differences between groups reflected differing organisational contexts and priorities, and limitations to the understanding each had of the challenges that other groups were facing. C onclusions: Improvements to mental health staffing and to access to allied health might increase the ability of GPs to meet the needs of less complex patients, but specific strategies to promote better integrated services are required to address the needs of rural and regional patients with complex mental health problems. The current study provides a baseline against which effects of recent initiatives to improve mental health care can be assessed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Short-termism among firms, the tendency to excessively discount long-term benefits and favour less valuable short-term benefits, has been a prominent issue in business and public policy debates but research to date has been inconclusive. We study how managers frame, interpret, and resolve problems of intertemporal choice in actual decisions by using computer aided text analysis to measure the frequency of top-team temporal references in 1653 listed Australian firms between 1992-2005. Contrary to short-termism arguments we find evidence of a significant general increase in Future orientation and a significant decrease in Current/Past orientation. We also show top-teams’ temporal orientation is related to their strategic orientation, specifically the extent to which they focus on Innovation-Expansion and Capacity Building.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Investigated human visual processing of simple two-colour patterns using a delayed match to sample paradigm with positron emission tomography (PET). This study is unique in that the authors specifically designed the visual stimuli to be the same for both pattern and colour recognition with all patterns being abstract shapes not easily verbally coded composed of two-colour combinations. The authors did this to explore those brain regions required for both colour and pattern processing and to separate those areas of activation required for one or the other. 10 right-handed male volunteers aged 18–35 yrs were recruited. The authors found that both tasks activated similar occipital regions, the major difference being more extensive activation in pattern recognition. A right-sided network that involved the inferior parietal lobule, the head of the caudate nucleus, and the pulvinar nucleus of the thalamus was common to both paradigms. Pattern recognition also activated the left temporal pole and right lateral orbital gyrus, whereas colour recognition activated the left fusiform gyrus and several right frontal regions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the development and preliminary experimental evaluation of a visionbased docking system to allow an Autonomous Underwater Vehicle (AUV) to identify and attach itself to a set of uniquely identifiable targets. These targets, docking poles, are detected using Haar rectangular features and rotation of integral images. A non-holonomic controller allows the Starbug AUV to orient itself with respect to the target whilst maintaining visual contact during the manoeuvre. Experimental results show the proposed vision system is capable of robustly identifying a pair of docking poles simultaneously in a variety of orientations and lighting conditions. Experiments in an outdoor pool show that this vision system enables the AUV to dock autonomously from a distance of up to 4m with relatively low visibility.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter will address psychodynamic, cognitive-behavioural, and developmental models in supervision by initially considering the historical underpinnings of each and then examining in turn some of the key processes that are evident in the supervisory relationships. Case studies are included where appropriate to highlight the application of theory to practice and several processes are fully elaborated over all models to enable a contemporary view of style and substance in the supervision context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intimate partner violence (IPV) is not only a problem for heterosexual couples. Although research in the area is beset by methodological and definitional problems, studies generally demonstrate that IPV also affects those who identify as non-heterosexual; that is, those sexualities that are typically categorized as lesbian, gay, bisexual, transgender, or intersex (LGBTI). IPV appears to be at least as prevalent in LGBTI relationships as it is in heterosexual couples, and follows similar patterns (e.g. Australian Research Centre on Sex, Health and Society 2006; Donovan et al. 2006; Chan 2005; Craft and Serovich 2005; Burke et al. 2002; Jeffries and Ball 2008; Kelly and Warshafsky 1987; Letellier 1994; Turrell 2000; Ristock 2003; Vickers 1996). There is, however, little in the way of specific community or social services support available to either victims or perpetrators of violence in same-sex relationships (see Vickers 1996). In addition, there are important differences in the experience of IPV between LGBTI and non-LGBTI victims, and even among LGBTI individuals; for example, among transgender populations (Chan 2005), and those who are HIV sero-positive (Craft and Serovich 2005). These different experiences of IPV include the use of HIV and the threat of “outing” a partner as tools of control, as just two examples (Jeffries and Ball 2008; Salyer 1999; WA Government 2008b). Such differences impact on how LGBTI victims respond to the violence, including whether or not and how they seek help, what services they are able to avail themselves of, and how likely they are to remain with, or return to, their violent partners (Burke et al. 2002). This chapter explores the prevalent heteronormative discourses that surround IPV, both within the academic literature, and in general social and government discourses. It seeks to understand how same-sex IPV remains largely invisible, and suggests that these dominant discourses play a major role in maintaining this invisibility. In many respects, it builds on work by a number of scholars who have begun to interrogate the criminal justice and social discourses surrounding violent crime, primarily sexual violence, and who problematize these discourses (see for example Carmody 2003; Carmody and Carrington 2000; Marcus 1992). It will begin by outlining these dominant discourses, and then problematize these by identifying some of the important differences between LGBTI IPV and IPV in heterosexual relationships. In doing so, this chapter will suggest some possible reasons for the silence regarding IPV in LGBTI relationships, and the effects that this can have on victims. Although an equally important area of research, and another point at which the limitations of dominant social discourses surrounding IPV can be brought to light, this chapter will not examine violence experienced by heterosexual men at the hands of their intimate female partners. Instead, it will restrict itself to IPV perpetrated within same-sex relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social construction of sexuality over the past one hundred and fifty years has created a dichotomy between heterosexual and non-heterosexual identities that essentially positions the former as “normal” and the latter as deviant. Even Kinsey’s and others’ work on the continuum of sexualities did little to alter the predominantly heterosexist perception of the non-heterosexual as “other” (Kinsey, Pomeroy and Martin 2007; Esterberg 2006; Franceour and Noonan 2007). Some political action and academic work is beginning to challenge such perceptions. Even some avenues of social interaction, such as the recent proliferation of online communities, may also challenge such views, or at least contribute to their being rethought in some ways. This chapter explores a specific kind of online community devoted to fan fiction, specifically homoerotic – or what is known colloquially as “slash” – fan fiction. Fan fiction is fiction, published on the internet, and written by fans of well-known books and television shows, using the characters to create new and varied plots. “Slash” refers to the pairing of two of the male characters in a romantic relationship, and the term comes from the punctuation mark dividing the named pair as, for example, Spock/Kirk from the Star Trek television series. Although there are some slash fan-fiction stories devoted to female-female relationships – called “femmeslash” – the term “slash” generally refers to male-male relationships, and will be utilized throughout this chapter, given that the research discussed focuses on communities centered around one such male pairing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this research is to examine the changing nature of risks that face journalists and media workers in the world's difficult, remote and hostile environments, and consider the 'adequacy' of managing hostile environment safety courses that some media organizations require prior to foreign assignments. The study utilizes several creative works and contributions to this area of analysis, which includes a documentary film production, course contributions, an emergency reference handbook, security and incident management reviews and a template for evacuation and contingency planning. The research acknowledges that employers have a 'duty of care' to personnel working in these environments, identifies the necessity for pre-deployment training and support, and provides a solution for organizations that wish to initiate a comprehensive framework to advise, monitor, protect and respond to incidents. Finally, it explores the possible development of a unique and holistic service to facilitate proactive and responsive support, in the form of a new profession of 'Editorial Logistics Officer' or 'Editorial Safety Officer' within media organizations. This area of research is vitally important to the profession, and the intended contribution is to introduce a simple and cost-efficient framework for media organizations that desire to implement pre-deployment training and field-support – as these programs save lives. The complete proactive and responsive services may be several years from implementation. However, this study demonstrates that the facilitation of Managing Hostile Environment (MHE) courses should be the minimum professional standard. These courses have saved lives in the past and they provide journalists with the tools to "cover the story, and not become the story."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Providing precise positioning services in regional areas to support agriculture, mining, and construction sectors depends on the availability of ground continuously operating GNSS reference stations and communications linking these stations to central computers and users. With the support of CRC for Spatial Information, a more comprehensive review has been completed recently to examine various wired and wireless communication links available for precise positioning services, in particular in the Queensland regional areas. The study covers a wide range of communication technologies that are currently available, including fixed, mobile wireless, and Geo-stationary and or low earth orbiting satellites. These technologies are compared in terms of bandwidth, typical latency, reliability, coverage, and costs. Additionally, some tests were also conducted to determine the performances of different systems in the real environment. Finally, based on user application requirements, the paper discusses the suitability of different communication links.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mainstream business process modelling techniques promote a design paradigm wherein the activities to be performed within a case, together with their usual execution order, form the backbone of a process model, on top of which other aspects are anchored. This paradigm, while eective in standardised and production-oriented domains, shows some limitations when confronted with processes where case-by-case variations and exceptions are the norm. In this thesis we develop the idea that the eective design of exible process models calls for an alternative modelling paradigm, one in which process models are modularised along key business objects, rather than along activity decompositions. The research follows a design science method, starting from the formulation of a research problem expressed in terms of requirements, and culminating in a set of artifacts that have been devised to satisfy these requirements. The main contributions of the thesis are: (i) a meta-model for object-centric process modelling incorporating constructs for capturing exible processes; (ii) a transformation from this meta-model to an existing activity-centric process modelling language, namely YAWL, showing the relation between object-centric and activity-centric process modelling approaches; and (iii) a Coloured Petri Net that captures the semantics of the proposed meta-model. The meta-model has been evaluated using a framework consisting of a set of work ow patterns. Moreover, the meta-model has been embodied in a modelling tool that has been used to capture two industrial scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions – as a new integration scenario requirement arises, a custom solution is built between the relevant systems. Bus-based solutions are now preferred, whereby all systems communicate via an intermediary system such as an enterprise service bus, using a common data exchange model. This research investigates the use of a common data exchange model based on open standards, specifically MIMOSA OSA-EAI, for asset management system integration. A case study is conducted that involves the integration of processes between a SCADA, maintenance decision support and work management system. A diverse number of software platforms are employed in developing the final solution, all tied together through MIMOSA OSA-EAI-based XML web services. The lessons learned from the exercise are presented throughout the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims : The aim of this study was to conduct an exploratory investigation into the in-session processes and behaviours that occur between therapists and young people in online counseling. Method: The Consensual Qualitative Research method was employed to identify in-session behaviours and a coding instrument was developed to determine their frequency of use and assess whether nuances carried in the meaning of text messages have an influential effect during sessions. Eighty-five single-session transcripts were examined in total by two independent coders. Results: Sample statistics revealed that, on average, rapport-building processes were used more consistently across cases with both types of processes having a moderately strong positive effect on young people. However, closer examination of these processes revealed weaker positive effects for in-session behaviours that rely more heavily on verbal and non-verbal cues to be accurately interpreted. Implications for Practice and Future Research: These findings imply that therapists may focus more on building rapport than accomplishing tasks with young people during online counselling sessions due to the absence of verbal and non-verbal information when communicating via text messages.