938 resultados para Exploitation aurifère
Resumo:
Prostitution is a difficult issue, particularly for feminists. Are prostitutes victims of exploitation or the most honest of women? Are clients perverts or just acting instinctively? Should prostitution be eliminated or supported? This book examines these contemporary questions and offers a way of thinking about the issues, which does not rely on these inappropriate and often ineffectual options. Repositioning the institution and its main players outside the confines of the prostitution debate offers new and exciting ways of thinking and acting for all those interested in moving this discussion into the twenty-first century.
Resumo:
Over the past decade, plants have been used as expression hosts for the production of pharmaceutically important and commercially valuable proteins. Plants offer many advantages over other expression systems such as lower production costs, rapid scale up of production, similar post-translational modification as animals and the low likelihood of contamination with animal pathogens, microbial toxins or oncogenic sequences. However, improving recombinant protein yield remains one of the greatest challenges to molecular farming. In-Plant Activation (InPAct) is a newly developed technology that offers activatable and high-level expression of heterologous proteins in plants. InPAct vectors contain the geminivirus cis elements essential for rolling circle replication (RCR) and are arranged such that the gene of interest is only expressed in the presence of the cognate viral replication-associated protein (Rep). The expression of Rep in planta may be controlled by a tissue-specific, developmentally regulated or chemically inducible promoter such that heterologous protein accumulation can be spatially and temporally controlled. One of the challenges for the successful exploitation of InPAct technology is the control of Rep expression as even very low levels of this protein can reduce transformation efficiency, cause abnormal phenotypes and premature activation of the InPAct vector in regenerated plants. Tight regulation over transgene expression is also essential if expressing cytotoxic products. Unfortunately, many tissue-specific and inducible promoters are unsuitable for controlling expression of Rep due to low basal activity in the absence of inducer or in tissues other than the target tissue. This PhD aimed to control Rep activity through the production of single chain variable fragments (scFvs) specific to the motif III of Tobacco yellow dwarf virus (TbYDV) Rep. Due to the important role played by the conserved motif III in the RCR, it was postulated that such scFvs can be used to neutralise the activity of the low amount of Rep expressed from a “leaky” inducible promoter, thus preventing activation of the TbYDV-based InPAct vector until intentional induction. Such scFvs could also offer the potential to confer partial or complete resistance to TbYDV, and possibly heterologous viruses as motif III is conserved between geminiviruses. Studies were first undertaken to determine the levels of TbYDV Rep and TbYDV replication-associated protein A (RepA) required for optimal transgene expression from a TbYDV-based InPAct vector. Transient assays in a non-regenerable Nicotiana tabacum (NT-1) cell line were undertaken using a TbYDV-based InPAct vector containing the uidA reporter gene (encoding GUS) in combination with TbYDV Rep and RepA under the control of promoters with high (CaMV 35S) or low (Banana bunchy top virus DNA-R, BT1) activity. The replication enhancer protein of Tomato leaf curl begomovirus (ToLCV), REn, was also used in some co-bombardment experiments to examine whether RepA could be substituted by a replication enhancer from another geminivirus genus. GUS expression was observed both quantitatively and qualitatively by fluorometric and histochemical assays, respectively. GUS expression from the TbYDV-based InPAct vector was found to be greater when Rep was expected to be expressed at low levels (BT1 promoter) rather than high levels (35S promoter). GUS expression was further enhanced when Rep and RepA were co-bombarded with a low ratio of Rep to RepA. Substituting TbYDV RepA with ToLCV REn also enhanced GUS expression but more importantly highest GUS expression was observed when cells were co-transformed with expression vectors directing low levels of Rep and high levels of RepA irrespective of the level of REn. In this case, GUS expression was approximately 74-fold higher than that from a non-replicating vector. The use of different terminators, namely CaMV 35S and Nos terminators, in InPAct vectors was found to influence GUS expression. In the presence of Rep, GUS expression was greater using pInPActGUS-Nos rather than pInPActGUS-35S. The only instance of GUS expression being greater from vectors containing the 35S terminator was when comparing expression from cells transformed with Rep, RepA and REnexpressing vectors and either non-replicating vectors, p35SGS-Nos or p35SGS-35S. This difference was most likely caused by an interaction of viral replication proteins with each other and the terminators. These results indicated that (i) the level of replication associated proteins is critical to high transgene expression, (ii) the choice of terminator within the InPAct vector may affect expression levels and (iii) very low levels of Rep can activate InPAct vectors hence controlling its activity is critical. Prior to generating recombinant scFvs, a recombinant TbYDV Rep was produced in E. coli to act as a control to enable the screening for Rep-specific antibodies. A bacterial expression vector was constructed to express recombinant TbYDV Rep with an Nterminal His-tag (N-His-Rep). Despite investigating several purification techniques including Ni-NTA, anion exchange, hydrophobic interaction and size exclusion chromatography, N-His-Rep could only be partially purified using a Ni-NTA column under native conditions. Although it was not certain that this recombinant N-His-Rep had the same conformation as the native TbYDV Rep and was functional, results from an electromobility shift assay (EMSA) showed that N-His-Rep was able to interact with the TbYDV LIR and was, therefore, possibly functional. Two hybridoma cell lines from mice, immunised with a synthetic peptide containing the TbYDV Rep motif III amino acid sequence, were generated by GenScript (USA). Monoclonal antibodies secreted by the two hybridoma cell lines were first screened against denatured N-His-Rep in Western analysis. After demonstrating their ability to bind N-His-Rep, two scFvs (scFv1 and scFv2) were generated using a PCR-based approach. Whereas the variable heavy chain (VH) from both cell lines could be amplified, only the variable light chain (VL) from cell line 2 was amplified. As a result, scFv1 contained VH and VL from cell line 1, whereas scFv2 contained VH from cell line 2 and VL from cell line 1. Both scFvs were first expressed in E. coli in order to evaluate their affinity to the recombinant TbYDV N-His-Rep. The preliminary results demonstrated that both scFvs were able to bind to the denatured N-His-Rep. However, EMSAs revealed that only scFv2 was able to bind to native N-His-Rep and prevent it from interacting with the TbYDV LIR. Each scFv was cloned into plant expression vectors and co-bombarded into NT-1 cells with the TbYDV-based InPAct GUS expression vector and pBT1-Rep to examine whether the scFvs could prevent Rep from mediating RCR. Although it was expected that the addition of the scFvs would result in decreased GUS expression, GUS expression was found to slightly increase. This increase was even more pronounced when the scFvs were targeted to the cell nucleus by the inclusion of the Simian virus 40 large T antigen (SV40) nuclear localisation signal (NLS). It was postulated that the scFvs were binding to a proportion of Rep, leaving a small amount available to mediate RCR. The outcomes of this project provide evidence that very high levels of recombinant protein can theoretically be expressed using InPAct vectors with judicious selection and control of viral replication proteins. However, the question of whether the scFvs generated in this project have sufficient affinity for TbYDV Rep to prevent its activity in a stably transformed plant remains unknown. It may be that other scFvs with different combinations of VH and VL may have greater affinity for TbYDV Rep. Such scFvs, when expressed at high levels in planta, might also confer resistance to TbYDV and possibly heterologous geminiviruses.
Resumo:
There are two key approaches to entrepreneurship, each of which has different implications for small business policy (Danson 2002). The first conceives of entrepreneurship as an economic process and can be traced to the work of Joseph Schumpeter who developed the concept of creative destruction to describe the entrepreneurial process that led to the simultaneous elimination of old industries and activities and the creation of new activities through the commercial application of new ideas. While entrepreneurship as a process of creative destruction might include start up activity amongst small firms, it does not exclusively involve small firms as large firms may contribute to the entrepreneurial process through the generation of new knowledge and by assisting in financing the development of new ideas amongst small firms. Although innovation occurs in large as well as small firms, the literature on small enterprise innovation draws heavily on Schumpeter’s depiction of the central role of the entrepreneur in the process of creative destruction, whereby the economic system is transformed from within and new cycles in economic life emerge in which new industries and markets replace old industries and markets. Schumpeter argued that entrepreneurs drove the process of innovation and that innovation was a stimulus to economic development and involved the development of new products, processes, methods of production or new forms of commercial or financial organisation (Schumpeter 1911). At a time when technological development and structuraleconomic change are occurring at a rapid pace, small firm innovation is seen to be critically important because empirical evidence, although not undisputed, indicates that SMEs make an important contribution to radical innovations in new industries (Nooteboom 1994). The second view of entrepreneurship focuses on the individual entrepreneur more than the entrepreneurial process. The entrepreneur is depicted as an owner of small businesses, and is regarded as having particular personal characteristics such as self-reliance, individual initiative and self-motivation. Entrepreneurs are also considered to have a behavioural orientation towards the exploitation of new ideas and opportunities. They are the risk takers who are able to see an opportunity and pursue it commercially despite the uncertainty of rewards. The capacity to plan, manage and lead is also seen to be identifying characteristics of entrepreneurs. Different small business policy approaches arise from these different perspectives on entrepreneurship. Small business policy approaches that emphasise the process by which new ideas are generated and applied commercially arise from the first and broader view of entrepreneurship. Policies designed to generate a population of risk taking and self-motivated individuals with highly developed management and commercial skills are more in keeping with the second approach, which is focused on the individual entrepreneur rather than the entrepreneurial process.
Resumo:
Principal Topic : According to Shane & Venkataraman (2000) entrepreneurship consists of the recognition and exploitation of venture ideas - or opportunities as they often called - to create future goods and services. This definition puts venture ideas is at the heart of entrepreneurship research. Substantial research has been done on venture ideas in order to enhance our understanding of this phenomenon (e.g. Choi & Shepherd, 2004; Shane, 2000; Shepherd & DeTienne, 2005). However, we are yet to learn what factors drive entrepreneurs' perceptions of the relative attractiveness of venture ideas, and how important different idea characteristics are for such assessments. Ruef (2002) recognized that there is an uneven distribution of venture ideas undertaken by entrepreneurs in the USA. A majority introduce either a new product/service or access a new market or market segment. A smaller percentage of entrepreneurs introduce a new method of production, organizing, or distribution. This implies that some forms of venture ideas are perceived by entrepreneurs as more important or valuable than others. However, Ruef does not provide any information regarding why some forms of venture ideas are more common than others among entrepreneurs. Therefore, this study empirically investigates what factors affect the attractiveness of venture ideas as well as their relative importance. Based on two key characteristics of venture ideas, namely venture idea newness and relatedness, our study investigates how different types and degrees of newness and relatedness of venture ideas affect their attractiveness as perceived by expert entrepreneurs. Methodology/Key : Propositions According to Schumpeter (1934) entrepreneurs introduce different types of venture ideas such as new products/services, new method of production, enter into new markets/customer and new method of promotion. Further, according to Schumpeter (1934) and Kirzner (1973) venture ideas introduced to the market range along a continuum of innovative to imitative ideas. The distinction between these two extremes of venture idea highlights an important property of venture idea, namely their newness. Entrepreneurs, in order to gain competitive advantage or above average returns introduce their venture ideas which may be either new to the world, new to the market that they seek to enter, substantially improved from current offerings and an imitative form of existing offerings. Expert entrepreneurs may be more attracted to venture ideas that exhibit high degree of newness because of the higher newness is coupled with increased market potential (Drucker, 1985) Moreover, certain individual characteristics also affect the attractiveness of venture idea. According to Shane (2000), individual's prior knowledge is closely associated with the recognition of venture ideas. Sarasvathy's (2001) Effectuation theory proposes a high degree of relatedness between venture ideas and the resource position of the individual. Thus, entrepreneurs may be more attracted to venture ideas that are closely aligned with the knowledge and/or resources they already possess. On the other hand, the potential financial gain (Shepherd & DeTienne, 2005) may be larger for ideas that are not close to the entrepreneurs' home turf. Therefore, potential financial gain is a stimulus that has to be considered separately. We aim to examine how entrepreneurs weigh considerations of different forms of newness and relatedness as well as potential financial gain in assessing the attractiveness of venture ideas. We use conjoint analysis to determine how expert entrepreneurs develop preferences for venture ideas which involved with different degrees of newness, relatedness and potential gain. This analytical method paves way to measure the trade-offs they make when choosing a particular venture idea. The conjoint analysis estimates respondents' preferences in terms of utilities (or part-worth) for each level of newness, relatedness and potential gain of venture ideas. A sample of 50 expert entrepreneurs who were awarded young entrepreneurship awards in Sri Lanka in 2007 is used for interviews. Each respondent is interviewed providing with 32 scenarios which explicate different combinations of possible profiles open them into consideration. Conjoint software (SPSS) is used to analyse data. Results and Implications : The data collection of this study is still underway. However, results of this study will provide information regarding the attractiveness of each level of newness, relatedness and potential gain of venture idea and their relative importance in a business model. Additionally, these results provide important implications for entrepreneurs, consultants and other stakeholders as regards the importance of different of attributes of venture idea coupled with different levels. Entrepreneurs, consultants and other stakeholders could make decisions accordingly.
Resumo:
This paper presents a new approach to improving the effectiveness of autonomous systems that deal with dynamic environments. The basis of the approach is to find repeating patterns of behavior in the dynamic elements of the system, and then to use predictions of the repeating elements to better plan goal directed behavior. It is a layered approach involving classifying, modeling, predicting and exploiting. Classifying involves using observations to place the moving elements into previously defined classes. Modeling involves recording features of the behavior on a coarse grained grid. Exploitation is achieved by integrating predictions from the model into the behavior selection module to improve the utility of the robot's actions. This is in contrast to typical approaches that use the model to select between different strategies or plays. Three methods of adaptation to the dynamic features of the environment are explored. The effectiveness of each method is determined using statistical tests over a number of repeated experiments. The work is presented in the context of predicting opponent behavior in the highly dynamic and multi-agent robot soccer domain (RoboCup).
Resumo:
While Australian cinema has produced popular movie genres since the 1970s, including action/adventure, road movies, crime, and horror movies, genre cinema has occupied a precarious position within a subsidised national cinema and has been largely written out of film history. In recent years the documentary Not Quite Hollywood (2008) has brought Australia’s genre movie heritage from the 1970s and 1980s back to the attention of cinephiles, critics and cult audiences worldwide. Since its release, the term ‘Ozploitation’ has become synonymous with Australian genre movies. In the absence of discussion about genre cinema within film studies, Ozploitation (and ‘paracinema’ as a theoretical lens) has emerged as a critical framework to fill this void as a de facto approach to genre and a conceptual framework for understanding Australian genres movies. However, although the Ozploitation brand has been extremely successful in raising the awareness of local genre flicks, Ozploitation discourse poses problems for film studies, and its utility is limited for the study of Australian genre movies. This paper argues that Ozploitation limits analysis of genre movies to the narrow confines of exploitation or trash cinema and obscures more important discussion of how Australian cinema engages with popular movies genres, the idea of Australian filmmaking as entertainment, and the dynamics of commercial filmmaking practises more generally.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
The broad objective of this study was to understand the incidence and severity of aggression among sexually abused girls who were trafficked and who were then further used for commercial sexual exploitation (referred to subsequently as sexually abused trafficked girls). In addition, the impact of counseling for minimizing aggression in these girls was investigated. A group of 120 sexually abused trafficked Indian girls and a group of 120 nonsexually abused Indian girls, aged 13 to 18, participated in the study. The sexually abused trafficked girls were purposively selected from four shelters located in and around Kolkata, India. The nonsexually abused girls were selected randomly from four schools situated near the shelters, and these girls were matched by age with the sexually abused trafficked girls. Data were collected using a Background Information Schedule and a standardized psychological test, that is, The Aggression Scale. Results revealed that 16.7% of the girls were first sexually abused between 6 and 9 years of age, 37.5% between 10 and 13 years of age, and 45.8% between 14 and 17 years of age. Findings further revealed that 4.2% of the sexually abused trafficked girls demonstrated saturated aggression, and 26.7% were highly aggressive, that is, extremely frustrated and rebellious. Across age groups, the sexually abused trafficked girls suffered from more aggression (p < .05), compared with the nonvictimized girls. Psychological interventions, such as individual and group counseling, were found to have a positive impact on the sexually abused trafficked girls. These findings should motivate counselors to deal with sexually abused children. It is also hoped that authorities in welfare homes will understand the importance of counseling for sexually abused trafficked children, and will appoint more counselors for this purpose.
Resumo:
Over the years, public health in relation to Australian Aboriginal people has involved many individuals and groups including health professionals, governments, politicians, special interest groups and corporate organisations. Since colonisation commenced until the1980s, public health relating to Aboriginal and Torres Strait Islander people was not necessarily in the best interests of Aboriginal and Torres Strait Islander people, but rather in the interests of the non-Aboriginal population. The attention that was paid focussed more generally around the subject of reproduction and issues of prostitution, exploitation, abuse and venereal diseases (Kidd, 1997). Since the late 1980s there has been a shift in the broader public health agenda (see Baum, 1998) along with public health in relation to Aboriginal and Torres Strait Islander people (NHMRC, 2003). This has been coupled with increasing calls to develop appropriate tertiary curriculum and to educate, train, and employ more Aboriginal and Torres Strait Islander and non-Aboriginal people in public health (Anderson et al., 2004; Genat, 2007; PHERP, 2008a, 2008b). Aboriginal and Torres Strait Islander people have been engaged in public health in ways in which they are in a position to influence the public health agenda (Anderson 2004; 2008; Anderson et al., 2004; NATSIHC, 2003). There have been numerous projects, programs and strategies that have sought to develop the Aboriginal and Torres Strait Islander Public Health workforce (AHMAC, 2002; Oldenburg et al., 2005; SCATSIH, 2002). In recent times the Aboriginal community controlled health sector has joined forces with other peak bodies and governments to find solutions and strategies to improve the health outcomes of Aboriginal and Torres Strait Islander peoples (NACCHO & Oxfam, 2007). This case study chapter will not address these broader activities. Instead it will explore the activities and roles of staff within the Public Health and Research Unit (PHRU) at the Victorian Aboriginal Community Controlled Health Organisation (VACCHO). It will focus on their experiences with education institutions, their work in public health and their thoughts on gaps and where improvements can be made in public health, research and education. What will be demonstrated is the diversity of education qualifications and experience. What will also be reflected is how people work within public health on a daily basis to enact change for equity in health and contribute to the improvement of future health outcomes of the Victorian Aboriginal community.
Resumo:
Sustainable development has long been promoted as the best answer to the world’s environmental problems. This term has generated mass appeal as it implies that both the development of the built environment and its associated resource consumption can be achieved without jeopardising the natural environment. In the urban context, sustainability issues have been reflected in the promotion of sustainable urban development, which emphasises the sensible exploitation of scarce natural resources for urbanisation in a manner that allows future generations to repeat the process. This chapter highlights attempts to promote sustainable urban development through an integration of three important considerations: planning, development and the ecosystem. It highlights the fact that spatial planning processes were traditionally driven by economic and social objectives, and rarely involved promoting the sustainability agenda to achieve a sustainable urban future. As a result, rapid urbanisation has created a variety of pressures on the ecosystem upon which we rely. It is believed that the integration of the urban planning and development processes within the limitations of the ecosystem, monitored by a sustainability assessment mechanism, would offer a better approach to maintaining sustainable resource use without compromising urban development.
Resumo:
In this paper, we present a control strategy design technique for an autonomous underwater vehicle based on solutions to the motion planning problem derived from differential geometric methods. The motion planning problem is motivated by the practical application of surveying the hull of a ship for implications of harbor and port security. In recent years, engineers and researchers have been collaborating on automating ship hull inspections by employing autonomous vehicles. Despite the progresses made, human intervention is still necessary at this stage. To increase the functionality of these autonomous systems, we focus on developing model-based control strategies for the survey missions around challenging regions, such as the bulbous bow region of a ship. Recent advances in differential geometry have given rise to the field of geometric control theory. This has proven to be an effective framework for control strategy design for mechanical systems, and has recently been extended to applications for underwater vehicles. Advantages of geometric control theory include the exploitation of symmetries and nonlinearities inherent to the system. Here, we examine the posed inspection problem from a path planning viewpoint, applying recently developed techniques from the field of differential geometric control theory to design the control strategies that steer the vehicle along the prescribed path. Three potential scenarios for surveying a ship?s bulbous bow region are motivated for path planning applications. For each scenario, we compute the control strategy and implement it onto a test-bed vehicle. Experimental results are analyzed and compared with theoretical predictions.
Resumo:
The explosion in use of online social networks is an important phenomenon that provides a new set of entrepreneurial opportunities. Emerging musicians have been among the first to exploit this new market opportunity – and indeed, many have used it successfully. A recent study Carter (2009) reveals that artists who earned the most returns had an online presence on multiple social online sites and services such as MySpace and Facebook. These web pages are leveraged to build fan bases and develop different types of revenue streams. Yet, little is currently known about discovery or exploitation of such opportunities.
Resumo:
With the emergence of multi-core processors into the mainstream, parallel programming is no longer the specialized domain it once was. There is a growing need for systems to allow programmers to more easily reason about data dependencies and inherent parallelism in general purpose programs. Many of these programs are written in popular imperative programming languages like Java and C]. In this thesis I present a system for reasoning about side-effects of evaluation in an abstract and composable manner that is suitable for use by both programmers and automated tools such as compilers. The goal of developing such a system is to both facilitate the automatic exploitation of the inherent parallelism present in imperative programs and to allow programmers to reason about dependencies which may be limiting the parallelism available for exploitation in their applications. Previous work on languages and type systems for parallel computing has tended to focus on providing the programmer with tools to facilitate the manual parallelization of programs; programmers must decide when and where it is safe to employ parallelism without the assistance of the compiler or other automated tools. None of the existing systems combine abstraction and composition with parallelization and correctness checking to produce a framework which helps both programmers and automated tools to reason about inherent parallelism. In this work I present a system for abstractly reasoning about side-effects and data dependencies in modern, imperative, object-oriented languages using a type and effect system based on ideas from Ownership Types. I have developed sufficient conditions for the safe, automated detection and exploitation of a number task, data and loop parallelism patterns in terms of ownership relationships. To validate my work, I have applied my ideas to the C] version 3.0 language to produce a language extension called Zal. I have implemented a compiler for the Zal language as an extension of the GPC] research compiler as a proof of concept of my system. I have used it to parallelize a number of real-world applications to demonstrate the feasibility of my proposed approach. In addition to this empirical validation, I present an argument for the correctness of the type system and language semantics I have proposed as well as sketches of proofs for the correctness of the sufficient conditions for parallelization proposed.
Resumo:
"How do you film a punch?" This question can be posed by actors, make-up artists, directors and cameramen. Though they can all ask the same question, they are not all seeking the same answer. Within a given domain, based on the roles they play, agents of the domain have different perspectives and they want the answers to their question from their perspective. In this example, an actor wants to know how to act when filming a scene involving a punch. A make-up artist is interested in how to do the make-up of the actor to show bruises that may result from the punch. Likewise, a director wants to know how to direct such a scene and a cameraman is seeking guidance on how best to film such a scene. This role-based difference in perspective is the underpinning of the Loculus framework for information management for the Motion Picture Industry. The Loculus framework exploits the perspective of agent for information extraction and classification within a given domain. The framework uses the positioning of the agent’s role within the domain ontology and its relatedness to other concepts in the ontology to determine the perspective of the agent. Domain ontology had to be developed for the motion picture industry as the domain lacked one. A rule-based relatedness score was developed to calculate the relative relatedness of concepts with the ontology, which were then used in the Loculus system for information exploitation and classification. The evaluation undertaken to date have yielded promising results and have indicated that exploiting perspective can lead to novel methods of information extraction and classifications.
Resumo:
Since the establishment of the first national strategic development plan in the early 1970s, the construction industry has played an important role in terms of the economic, social and cultural development of Indonesia. The industry’s contribution to Indonesia’s gross domestic product (GDP) increased from 3.9% in 1973 to 7.7% in 2007. Business Monitoring International (2009) forecasts that Indonesia is home to one of the fastest-growing construction industries in Asia despite the average construction growth rate being expected to remain under 10% over the period 2006 – 2010. Similarly, Howlett and Powell (2006) place Indonesia as one of the 20 largest construction markets in 2010. Although the prospects for the Indonesian construction industry are now very promising, many local construction firms still face serious difficulties, such as poor performance and low competitiveness. There are two main reasons behind this problem: the environment that they face is not favourable; the other is the lack of strategic direction to improve competitiveness and performance. Furthermore, although strategic management has now become more widely used by many large construction firms in developed countries, practical examples and empirical studies related to the Indonesian construction industry remain scarce. In addition, research endeavours related to these topics in developing countries appear to be limited. This has potentially become one of the factors hampering efforts to guide Indonesian construction enterprises. This research aims to construct a conceptual model to enable Indonesian construction enterprises to develop a sound long-term corporate strategy that generates competitive advantage and superior performance. The conceptual model seeks to address the main prescription of a dynamic capabilities framework (Teece, Pisano & Shuen, 1997; Teece, 2007) within the context of the Indonesian construction industry. It is hypothesised that in a rapidly changing and varied environment, competitive success arises from the continuous development and reconfiguration of firm’s specific assets achieving competitive advantage is not only dependent on the exploitation of specific assets/capabilities, but on the exploitation of all of the assets and capabilities combinations in the dynamic capabilities framework. Thus, the model is refined through sequential statistical regression analyses of survey results with a sample size of 120 valid responses. The results of this study provide empirical evidence in support of the notion that a competitive advantage is achieved via the implementation of a dynamic capability framework as an important way for a construction enterprise to improve its organisational performance. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organisational performance. If a dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries. This study also demonstrates the importance of the multi-stage nature of the model which provides a rich understanding of the dynamic process by which asset-capability should be exploited in combination by the construction firms operating in varying levels of hostility. Such findings are believed to be useful to both academics and practitioners, however, as this research represents a dynamic capabilities framework at the enterprise level, future studies should continue to explore and examine the framework in other levels of strategic management in construction as well as in other countries where different cultures or similar conditions prevails.