991 resultados para Military inspectors general
Resumo:
The paper has a twofold purpose. First it highlights the importance of accounting information in the economic development of developing countries, with a particular focus on the nation of Libya. Secondly, using the case of Libya's General Company for Pipelines (GCP), it demonstrates that the use of accounting information to achieve economic development goals is determined to a large extent by the political/ideological setting in which it is generated. The study is based on a literature review and archival research, reinforced by a qualitative case study comprised of interviews, attendance at meetings and a study of internal documents. A study of The General Company for Pipelines (GCP) revealed that frequent politically driven changes in the structure and number of popular congresses and committees severely limited the use of accounting information, relegating it to a formal role. In consequence, accounting information had litle effect on stimulating economic development in Libya. This study focuses on one case study which does limit generalisability. However, it also suggests fruitful research areas considering the historic factors which have determined the accounting role in developing and planned economies. By providing insights about social factors which have determined the use of accounting in a planned economy, this study has implications for similar economies as they move towards a more globalised mode of operations which enhance the role of accounting in meeting economic development needs. If devleoping countries are to harness the potential of accounting aid in the achievement of their development plans, the social and political setting in which accounting has been conducted needs to be understood.
Resumo:
"The 1990s saw the United Nations, the militaries of key member states, and NGOs increasingly entangled in the complex affairs of disrupted states. Whether as deliverers of humanitarian assistance or as agents of political, social, and civic reconstruction, whether in Somalia, Bosnia, Kosovo, or East Timor, these actors have had to learn ways of interacting with each other in order to optimize the benefits for the populations they seek to assist. Yet the challenges have proved daunting. Civil and military actors have different organizational cultures and standard operating procedures and are confronted with the need to work together to perform tasks to which different actors may attach quite different priorities."--BOOK JACKET.
Resumo:
In this paper, weighted fair rate allocation for ATM available bit rate (ABR) service is discussed with the concern of the minimum cell rate (MCR). Weighted fairness with MCR guarantee has been discussed recently in the literature. In those studies, each ABR virtual connection (VC) is first allocated its MCR, then the remaining available bandwidth is further shared among ABR VCs according to their weights. For the weighted fairness defined in this paper, the bandwidth is first allocated according to each VC's weight; if a VC's weighted share is less than its MCR, it should be allocated its MCR instead of the weighted share. This weighted fairness with MCR guarantee is referred to as extended weighted (EXW) fairness. Certain theoretical issues related to EXW, such as its global solution and bottleneck structure, are first discussed in the paper. A distributed explicit rate allocation algorithm is then proposed to achieve EXW fairness in ATM networks. The algorithm is a general-purpose explicit rate algorithm in the sense that it can realise almost all the fairness principles proposed for ABR so far whilst only minor modifications may be needed.
Resumo:
Computer simulation has been widely accepted as an essential tool for the analysis of many engineering systems. It is nowadays perceived to be the most readily available and feasible means of evaluating operations in real railway systems. Based on practical experience and theoretical models developed in various applications, this paper describes the design of a general-purpose simulation system for train operations. Its prime objective is to provide a single comprehensive computer-aided engineering tool for most studies on railway operations so that various aspects of the railway systems with different operation characteristics can be investigated and analysed in depth. This system consists of three levels of simulation. The first is a single-train simulator calculating the running time of a train between specific points under different track geometry and traction conditions. The second is a dual-train simulator which is to find the minimum headway between two trains under different movement constraints, such as signalling systems. The third is a whole-system multi-train simulator which carries out process simulation of the real operation of a railway system according to a practical or planned train schedule or headway; and produces an overall evaluation of system performance.
Resumo:
Drivers are known to be optimistic about their risk of crash involvement, believing that they are less likely to be involved in a crash than other drivers. However, little comparative research has been conducted among other road users. In addition, optimism about crash risk is conceptualised as applying only to an individual’s assessment of his or her personal risk of crash involvement. The possibility that the self-serving nature of optimism about safety might be generalised to the group-level as a cyclist or a pedestrian, i.e., becoming group-serving rather than self-serving, has been overlooked in relation to road safety. This study analysed a subset of data collected as part of a larger research project on the visibility of pedestrians, cyclists and road workers, focusing on a set of questionnaire items administered to 406 pedestrians, 838 cyclists and 622 drivers. The items related to safety in various scenarios involving drivers, pedestrians and cyclists, allowing predictions to be derived about group differences in agreement with items based on the assumption that the results would exhibit group-serving bias. Analysis of the responses indicated that specific hypotheses about group-serving interpretations of safety and responsibility were supported in 22 of the 26 comparisons. When the nine comparisons relevant to low lighting conditions were considered separately, seven were found to be supported. The findings of the research have implications for public education and for the likely acceptance of messages which are inconsistent with current assumptions and expectations of pedestrians and cyclists. They also suggest that research into group-serving interpretations of safety, even for temporary roles rather than enduring groups, could be fruitful. Further, there is an implication that gains in safety can be made by better educating road users about the limitations of their visibility and the ramifications of this for their own road safety, particularly in low light.
Resumo:
The number of Australian children requiring foster care due to abuse and neglect is increasing at a faster rate than suitable carers can be recruited. Currently increased numbers of foster children are presenting with higher care needs. Evidence suggests carers with a higher education could contribute to placement stability and ultimately provide more positive outcomes for this group of children. This paper explores the level of interest by tertiary educated persons toward a model of fostering for children with higher needs. Using a descriptive survey methodology, a convenience sample of 644 university undergraduate and postgraduate students within faculties of health sciences, and education, arts and social sciences was employed. Psychology students in the 17-26 year old age group showed greatest interest in a professional foster care model and this was statistically significant (p=0.002 955 CI .000-.010) when compared to other health professionals and other age groups. Education students held the highest interest in general fostering although not statistically significant. When these survey results were extrapolated to the total number of health professionals in Australia there could be 8,385 potential recruits for a model professional foster care. Focused campaigns are required to source professional as recruits to fostering with the benefit of servicing the placement needs of higher care needs children and contributing to general foster care resources.
Resumo:
Three recent papers published in Chemical Engineering Journal studied the solution of a model of diffusion and nonlinear reaction using three different methods. Two of these studies obtained series solutions using specialized mathematical methods, known as the Adomian decomposition method and the homotopy analysis method. Subsequently it was shown that the solution of the same particular model could be written in terms of a transcendental function called Gauss’ hypergeometric function. These three previous approaches focused on one particular reactive transport model. This particular model ignored advective transport and considered one specific reaction term only. Here we generalize these previous approaches and develop an exact analytical solution for a general class of steady state reactive transport models that incorporate (i) combined advective and diffusive transport, and (ii) any sufficiently differentiable reaction term R(C). The new solution is a convergent Maclaurin series. The Maclaurin series solution can be derived without any specialized mathematical methods nor does it necessarily involve the computation of any transcendental function. Applying the Maclaurin series solution to certain case studies shows that the previously published solutions are particular cases of the more general solution outlined here. We also demonstrate the accuracy of the Maclaurin series solution by comparing with numerical solutions for particular cases.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Background Concern about skin cancer is a common reason for people from predominantly fair-skinned populations to present to primary care doctors. Objectives To examine the frequency and body-site distribution of malignant, pre-malignant and benign pigmented skin lesions excised in primary care. Methods This prospective study conducted in Queensland, Australia, included 154 primary care doctors. For all excised or biopsied lesions, doctors recorded the patient's age and sex, body site, level of patient pressure to excise, and the clinical diagnosis. Histological confirmation was obtained through pathology laboratories. Results Of 9650 skin lesions, 57·7% were excised in males and 75·0% excised in patients ≥50years. The most common diagnoses were basal cell carcinoma (BCC) (35·1%) and squamous cell carcinoma (SCC) (19·7%). Compared with the whole body, the highest densities for SCC, BCC and actinic keratoses were observed on chronically sun-exposed areas of the body including the face in males and females, the scalp and ears in males, and the hands in females. The density of BCC was also high on intermittently or rarely exposed body sites. Females, younger patients and patients with melanocytic naevi were significantly more likely to exert moderate/high levels of pressure on the doctor to excise. Conclusions More than half the excised lesions were skin cancer, which mostly occurred on the more chronically sun-exposed areas of the body. Information on the type and body-site distribution of skin lesions can aid in the diagnosis and planned management of skin cancer and other skin lesions commonly presented in primary care.
Resumo:
Objective: To examine whether health professionals who commonly deal with mental disorder are able to identify co occurring alcohol misuse in young people presenting with depression. Method: Between September 2006 and January 2007, a survey examining beliefs regarding appropriate interventions for mental disorder in youth was sent to 1710 psychiatrists, 2000 general practitioners (GPs), 1628 mental health nurses, and 2000 psychologists in Australia. Participants within each professional group were randomly given one of four vignettes describing a young person with a DSM-IV mental disorder. Herein is reported data from the depression and depression with alcohol misuse vignettes. Results: A total of 305 psychiatrists, 258 GPs, 292 mental health nurses and 375 psychologists completed one of the depression vignettes. A diagnosis of mood disorder was identified by at least 83.8% of professionals, with no significant differences noted between professional groups. Rates of reported co-occurring substance use disorders were substantially lower, particularly among older professionals and psychologists. Conclusions: GPs, psychologists and mental health professionals do not readily identify co-occurring alcohol misuse in young people with depression. Given the substantially negative impact of co-occurring disorders, it is imperative that health-care professionals are appropriately trained to detect such disorders promptly, to ensure young people have access to effective, early intervention.
Resumo:
A general procedure to determine the principal domain (i.e., nonredundant region of computation) of any higher-order spectrum is presented, using the bispectrum as an example. The procedure is then applied to derive the principal domain of the trispectrum of a real-valued, stationary time series. These results are easily extended to compute the principal domains of other higher-order spectra