942 resultados para Disorderly conduct
Resumo:
Mechanical control systems have become a part of our everyday life. Systems such as automobiles, robot manipulators, mobile robots, satellites, buildings with active vibration controllers and air conditioning systems, make life easier and safer, as well as help us explore the world we live in and exploit it’s available resources. In this chapter, we examine a specific example of a mechanical control system; the Autonomous Underwater Vehicle (AUV). Our contribution to the advancement of AUV research is in the area of guidance and control. We present innovative techniques to design and implement control strategies that consider the optimization of time and/or energy consumption. Recent advances in robotics, control theory, portable energy sources and automation increase our ability to create more intelligent robots, and allows us to conduct more explorations by use of autonomous vehicles. This facilitates access to higher risk areas, longer time underwater, and more efficient exploration as compared to human occupied vehicles. The use of underwater vehicles is expanding in every area of ocean science. Such vehicles are used by oceanographers, archaeologists, geologists, ocean engineers, and many others. These vehicles are designed to be agile, versatile and robust, and thus, their usage has gone from novelty to necessity for any ocean expedition.
Resumo:
Operators of busy contemporary airports have to balance tensions between the timely flow of passengers, flight operations, the conduct of commercial business activities and the effective application of security processes. In addition to specific onsite issues airport operators liaise with a range of organisations which set and enforce aviation-related policies and regulations as well as border security agencies responsible for customs, quarantine and immigration, in addition to first response security services. The challenging demands of coordinating and planning in such complex socio-technical contexts place considerable pressure on airport management to facilitate coordination of what are often conflicting goals and expectations among groups that have standing in respect to safe and secure air travel. What are, as yet, significantly unexplored issues in large airports are options for the optimal coordination of efforts from the range of public and private sector participants active in airport security and crisis management. A further aspect of this issue is how airport management systems operate when there is a transition from business-as-usual into an emergency/crisis situation and then, on recovery, back to ‘normal’ functioning. Business Continuity Planning (BCP), incorporating sub-plans for emergency response, continuation of output and recovery of degraded operating capacity, would fit such a context. The implementation of BCP practices in such a significant high security setting offers considerable potential benefit yet entails considerable challenges. This paper presents early results of a 4 year nationally funded industry-based research project examining the merger of Business Continuity Planning and Transport Security Planning as a means of generating capability for improved security and reliability and, ultimately, enhanced resilience in major airports. The project is part of a larger research program on the Design of Secure Airports that includes most of the gazetted ‘first response’ international airports in Australia, key Aviation industry groups and all aviation-related border and security regulators as collaborative partners. The paper examines a number of initial themes in the research, including: ? Approaches to integrating Business Continuity & Aviation Security Planning within airport operations; ? Assessment of gaps in management protocols and operational capacities for identifying and responding to crises within and across critical aviation infrastructure; ? Identification of convergent and divergent approaches to crisis management used across Austral-Asia and their alignment to planned and possible infrastructure evolution.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Provisional supervision (PS) is Hong Kong’s proposed new corporate rescue procedure. In essence, it is a procedure for the preparation by a professional, usually an accountant or a solicitor, of a proposal for a voluntary arrangement, supported by a moratorium. There should be little court involvement in the process and it is anticipated that the costs and delays of the process would be less than alternate, currently available procedures. This article will retrace some of the key events and issues arising from the numerous policy and legislative debates about PS in Hong Kong. At present the Hong Kong government is in the midst of drafting a new Bill on corporate rescue procedure to be introduced to the HKSAR Legislative Council. This will be the third attempt. Setting aside the controversies and the content of this new effort by the Hong Kong administration, the Global Financial Crisis in 2008 has signalled to the international policy and business community, free markets alone cannot be an effective regulatory mechanism. Having legal safeguards and clear rules to regulate procedures and conduct of market participants are imperative to avoid future financial meltdowns.
Resumo:
Hot spot identification (HSID) plays a significant role in improving the safety of transportation networks. Numerous HSID methods have been proposed, developed, and evaluated in the literature. The vast majority of HSID methods reported and evaluated in the literature assume that crash data are complete, reliable, and accurate. Crash under-reporting, however, has long been recognized as a threat to the accuracy and completeness of historical traffic crash records. As a natural continuation of prior studies, the paper evaluates the influence that under-reported crashes exert on HSID methods. To conduct the evaluation, five groups of data gathered from Arizona Department of Transportation (ADOT) over the course of three years are adjusted to account for fifteen different assumed levels of under-reporting. Three identification methods are evaluated: simple ranking (SR), empirical Bayes (EB) and full Bayes (FB). Various threshold levels for establishing hotspots are explored. Finally, two evaluation criteria are compared across HSID methods. The results illustrate that the identification bias—the ability to correctly identify at risk sites--under-reporting is influenced by the degree of under-reporting. Comparatively speaking, crash under-reporting has the largest influence on the FB method and the least influence on the SR method. Additionally, the impact is positively related to the percentage of the under-reported PDO crashes and inversely related to the percentage of the under-reported injury crashes. This finding is significant because it reveals that despite PDO crashes being least severe and costly, they have the most significant influence on the accuracy of HSID.
Resumo:
Association rule mining has contributed to many advances in the area of knowledge discovery. However, the quality of the discovered association rules is a big concern and has drawn more and more attention recently. One problem with the quality of the discovered association rules is the huge size of the extracted rule set. Often for a dataset, a huge number of rules can be extracted, but many of them can be redundant to other rules and thus useless in practice. Mining non-redundant rules is a promising approach to solve this problem. In this paper, we first propose a definition for redundancy, then propose a concise representation, called a Reliable basis, for representing non-redundant association rules. The Reliable basis contains a set of non-redundant rules which are derived using frequent closed itemsets and their generators instead of using frequent itemsets that are usually used by traditional association rule mining approaches. An important contribution of this paper is that we propose to use the certainty factor as the criterion to measure the strength of the discovered association rules. Using this criterion, we can ensure the elimination of as many redundant rules as possible without reducing the inference capacity of the remaining extracted non-redundant rules. We prove that the redundancy elimination, based on the proposed Reliable basis, does not reduce the strength of belief in the extracted rules. We also prove that all association rules, their supports and confidences, can be retrieved from the Reliable basis without accessing the dataset. Therefore the Reliable basis is a lossless representation of association rules. Experimental results show that the proposed Reliable basis can significantly reduce the number of extracted rules. We also conduct experiments on the application of association rules to the area of product recommendation. The experimental results show that the non-redundant association rules extracted using the proposed method retain the same inference capacity as the entire rule set. This result indicates that using non-redundant rules only is sufficient to solve real problems needless using the entire rule set.
Resumo:
Copyright protects much of the creative, cultural, educational, scientific and informational material generated by federal, State/Territory and local governments and their constituent departments and agencies. Governments at all levels develop, manage and distribute a vast array of materials in the form of documents, reports, websites, datasets and databases on CD or DVD and files that can be downloaded from a website. Under the Copyright Act 1968 (Cth), with few exceptions government copyright is treated the same as copyright owned by non-government parties insofar as the range of protected materials and the exclusive proprietary rights attaching to them are concerned. However, the rationale for recognizing copyright in public sector materials and vesting ownership of copyright in governments is fundamentally different to the main rationales underpinning copyright generally. The central justification for recognizing Crown copyright is to ensure that government documents and materials created for public administrative purposes are disseminated in an accurate and reliable form. Consequently, the exclusive rights held by governments as copyright owners must be exercised in a manner consistent with the rationale for conferring copyright ownership on them. Since Crown copyright exists primarily to ensure that documents and materials produced for use in the conduct of government are circulated in an accurate and reliable form, governments should exercise their exclusive rights to ensure that their copyright materials are made available for access and reuse, in accordance with any laws and policies relating to access to public sector materials. While copyright law vests copyright owners with extensive bundles of exclusive rights which can be exercised to prevent others making use of the copyright material, in the case of Crown copyright materials these rights should rarely be asserted by government to deviate from the general rule that Crown copyright materials will be available for “full and free reproduction” by the community at large.
Resumo:
Alcohol consumption has been a popular leisure activity among Australian since European Settlement. Australians currently consume 7.2 litres per capita pure alcohol and Australia in regards to alcohol consumption is ranked as the 22nd highest country of 58 countries. Although the alcohol industry has provided leisure, employment and government taxes, alcohol use has also become associated with chronic health problems, crime, public disorder and violence. Drunken and disorderly behaviour is commonly associated with Pubs, Clubs and Hotels, particularly in the late night entertainment areas. Historically, drunkenness and disorderly behaviour has been managed by measures such as floggings, jail and treatment in asylums. Alcohol has also been banned in specific areas and restrictions have applied to hours and days of operation. In more recent times alcohol policies have included extended trading hours, restricted trading hours and bans in some Aboriginal communities in order to reduce alcohol-related violence. Community and business partnerships in and around licensed premises have also developed in order to address the noise, violence and disorderly behaviour that often occurs in the evenings and early mornings. There is an urgent need for the government to be more robust about implementing effective alcohol control policies in order to prevent and reduce the harmful effects of alcohol.
Resumo:
Under a Services Agreement dated 16th April 2010 the Australian Capital Territory (ACT) engaged Knowledge Consulting Pty Ltd to conduct an independent review of operations at the Alexander Maconochie Centre (AMC) in the ACT. The Review was commissioned following a motion passed in the ACT Legislative Assembly as follows: “That this Assembly: (1) notes: (a) concerns regarding the operation of the AMC; (b) the unanimous findings of the Standing Committee on Justice and Community Safety report, Inquiry into the delay in the commencement of operations at the Alexander Maconochie Centre; and (c) the Government’s intention to have a review into the operation of the AMC after its first year of operation; and (2) calls on the Government to: (a) commission an independent reviewer to conduct the one year review into the AMC; (b) ensure that the review be open and transparent and public, and include input from community and non-government groups with an interest or involvement in the AMC, including on the terms of reference for the review; (c) ensure the review is completed in a timely manner and be tabled in the Legislative Assembly immediately upon completion; and (d) report upon the progress of the review in August 2010;”
Resumo:
The ethical conduct of professionals has been the focus of increasing scrutiny over the past several decades as members of the public, the media, professional bodies, and legislative authorities have struggled to define ethical behaviour in times of governmental change, increasing internationalisation, globalised communications, threats of terrorism, and the challenges of developments in science and medicine (e.g., Demmke & Bossaert, 2004). National governments and transnational bodies have responded to these concerns about ethics and corruption through measures such as the United Nations Convention Against Corruption (United Nations Office on Drugs and Crime, 2004), Transparency International’s annual corruption index (2010) and Queensland’s Public Sector Ethics Act 1994 (Queensland Parliament 1994). Similarly, academic interest in ethics and its application across a range of domains(e.g., business, health care, social welfare, criminal justice, law, journalism, defence, environment, and media) has also increased. To illustrate, in 1993, a non-partisan, non-profit national umbrella organisation, the Australian Association for Professional and Applied Ethics, was formed following a conference concerned with the teaching of ethics (http://www.arts.unsw.edu.au./aapae/about_aapae/about_aapae.htm), while a recent review of the Excellence in Research for Australian rankings of national and international academic journals revealed that 16 journals related to ethics had received the top ratings of A* or A (Australian Research Council, 2009). In this chapter we examine professional ethics and argue, with specific reference to the context of pre-service teacher education, that Service-learning is one way of enhancing emerging professionals’ understanding of ethics.
Resumo:
Item folksonomy or tag information is a kind of typical and prevalent web 2.0 information. Item folksonmy contains rich opinion information of users on item classifications and descriptions. It can be used as another important information source to conduct opinion mining. On the other hand, each item is associated with taxonomy information that reflects the viewpoints of experts. In this paper, we propose to mine for users’ opinions on items based on item taxonomy developed by experts and folksonomy contributed by users. In addition, we explore how to make personalized item recommendations based on users’ opinions. The experiments conducted on real word datasets collected from Amazon.com and CiteULike demonstrated the effectiveness of the proposed approaches.
Resumo:
Anna Hirsch and Clare Dixon (2008, 190) state that creative writers’ ‘obsession with storytelling…might serve as an interdisciplinary tool for evaluating oral histories.’ This paper enters a dialogue with Hirsch and Dixon’s statement by documenting an interview methodology for a practice-led PhD project, The Artful Life Story: Oral History and Fiction, which investigates the fictionalising of oral history. ----- ----- Alistair Thomson (2007, 62) notes the interdisciplinary nature of oral history scholarship from the 1980s onwards. As a result, oral histories are being used and understood in a variety of arts-based settings. In such contexts, oral histories are not valued so much for their factual content but as sources that are at once dynamic, emotionally authentic and open to a multiplicity of interpretations. How can creative writers design and conduct interviews that reflect this emphasis? ----- ----- The paper briefly maps the growing trend of using oral histories in fiction and ethnographic novels, in order to establish the need to design interviews for arts-based contexts. I describe how I initially designed the interviews to suit the aims of my practice. Once in the field, however, I found that my original methods did not account for my experiences. I conclude with the resulting reflection and understanding that emerged from these problematic encounters, focusing on the technique of steered monologue (Scagliola 2010), sometimes referred to as the Biographic Narrative Interpretative Method (Wengraf 2001, Jones 2006).
Resumo:
It is generally acknowledged that mooting is an effective way to enhance the teaching of practical skills in legal education as well as to provide an authentic learning experience with links to the real world. However, there are a number of impediments to students participating in mooting; in particular being located off-campus, inexperience and lack of time. It has been suggested that technology may be a means of overcoming these impediments. However the use of technology in mooting has not been tested. This paper will report on a trial of the use of Second Life and Elluminate and videoconferencing as platforms for the conduct of moots. The trials identified limitations in the use of technology for mooting in particularly in relation to the development of advocacy skills. The paper will conclude that these limitations can be overcome by careful consideration of the appropriate technology to be used depending on the context and the objectives to be achieved by the moot. It will also suggest that in order to provide an authentic use of online communication technology in a court setting, the best available technology should be used for the conduct of moot competitions.
Resumo:
While the importance of literature studies in the IS discipline is well recognized, little attention has been paid to the underlying structure and method of conducting effective literature reviews. Despite the fact that literature is often used to refine the research context and direct the pathways for successful research outcomes, there is very little evidence of the use of resource management tools to support the literature review process. In this paper we want to contribute to advancing the way in which literature studies in Information Systems are conducted, by proposing a systematic, pre-defined and tool-supported method to extract, analyse and report literature. This paper presents how to best identify relevant IS papers to review within a feasible and justifiable scope, how to extract relevant content from identified papers, how to synthesise and analyse the findings of a literature review and what are ways to effectively write and present the results of a literature review. The paper is specifically targeted towards novice IS researchers, who would seek to conduct a systematic detailed literature review in a focused domain. Specific contributions of our method are extensive tool support, the identification of appropriate papers including primary and secondary paper sets and a pre-codification scheme. We use a literature study on shared services as an illustrative example to present the proposed approach.
Resumo:
In silico experimental modeling of cancer involves combining findings from biological literature with computer-based models of biological systems in order to conduct investigations of hypotheses entirely in the computer laboratory. In this paper, we discuss the use of in silico modeling as a precursor to traditional clinical and laboratory research, allowing researchers to refine their experimental programs with an aim to reducing costs and increasing research efficiency. We explain the methodology of in silico experimental trials before providing an example of in silico modeling from the biomathematical literature with a view to promoting more widespread use and understanding of this research strategy.