988 resultados para Academic Events


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The occurrence of and conditions favourable to nucleation were investigated at an industrial and commercial coastal location in Brisbane, Australia during five different campaigns covering a total period of 13 months. To identify potential nucleation events, the difference in number concentration in the size range 14-30 nm (N14-30) between consecutive observations was calculated using first-order differencing. The data showed that nucleation events were a rare occurrence, and that in the absence of nucleation the particle number was dominated by particles in the range 30-300 nm. In many instances, total particle concentration declined during nucleation. There was no clear pattern in change in NO and NO2 concentrations during the events. SO2 concentration, in the majority of cases, declined during nucleation but there were exceptions. Most events took place in summer, followed by winter and then spring, and no events were observed for the autumn campaigns. The events were associated with sea breeze and long-range transport. Roadside emissions, in contrast, did not contribute to nucleation, probably due to the predominance of particles in the range 50-100 nm associated with these emissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the lead article for an issue of M/C Journal on the theme ‘obsolete.’ It uses the history of the International Journal of Cultural Studies (of which the author has been editor since 1997) to investigate technological innovations and their scholarly implications in academic journal publishing; in particular the obsolescence of the print form. Print-based elements like cover-design, the running order of articles, special issues, refereeing and the reading experience are all rendered obsolete with the growth of online access to individual articles. The paper argues that individuation of reading choices may be accompanied by less welcome tendencies, such as a decline in collegiality, disciplinary innovation, and trust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research project set out to explore Unitary Authority (UA) involvement in festivals and special events across Wales. It considers the level and nature of UA involvement and investigates activity by event purpose; reasons for, and characteristics of, UA engagement; and, crucially, the extent and nature of event evaluation. The study’s aim was to begin the development of a baseline of information for further research into the growing use of festivals and special events as a strategy for local economic development in Wales. A quantitative survey approach facilitated a comprehensive snapshot of UA responses whilst also incorporating discursive elements. A telephone survey was designed and undertaken with representatives of all 22 UA departments responsible for festivals and events in Wales. The research reveals a significant level of festival and special event activity across Wales, supported primarily for its perceived socio-cultural value. However, evaluation would appear to be focused on improving processes and measuring economic outputs rather than assessing whether socio-cultural objectives are being achieved. Whilst overwhelmingly positive about efforts to improve approaches to evaluation, respondents held clear views about the complications most likely to hamper any such efforts. These responses focused upon the need for flexibility, cost effectiveness and comparability across festival and special event typologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study investigated the relationships between academic selfconcepts, learner self-concept, and approaches to learning in elementary school students. A sample of 580 Australian Grade 6 and 7 school students with a mean age of 10.7 years participated in the study. Weak negative correlations between learner self-concepts and surface approaches to learning were identiŽ ed. In contrast, deep approaches for both boys and girls showed the highest positive correlations with school self-concept and learning self-concept. Only slight variations in these Ž gures were found between boys and girls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A complete change of career forces a seismic shift in every aspect of your life. From day one, you have to face the loss of long held beliefs, behaviours, the known world of self, and security. We came from professions that themselves are poles apart, and many of the challenges we faced entering the profession were the same: juggling full-time work, part time study, and family commitmemts, taking a pay cut, and loss of social life. But over a short period of time we both transitioned to our new profession successfully. so what make our successful transition possible?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data were collected from 269 Australian primary school children in grades 3 to 7. Self-report questionnaires measuring students' perceptions of the frequency of positive and negative statements directed to them by their teacher, their positive and negative self-talk; and their reading, mathematics and learning self-concepts were administered. Positive statements made by teachers were found to be directly related to positive self-talk and to maths and learning self-concepts. Teachers' positive statements were also indirectly related to reading self-concept through positive self-talk. Negative statements made by teachers were not predictive of self-talk or self-concepts for the total sample but were predictive of maths self-concept for girls and negative self-talk for boys. Implications for teachers and educational psychologists are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper uses qualitative textual analysis to compare journalistic and academic accounts of child sexual abuse. There are seven main differences. Academic accounts suggest higher levels of neglect, emotional abuse, and physical abuse than sexual abuse in Australia, by contrast, journalistic accounts highlight sexual abuse. Academic accounts suggest that child sexual abuse in Australia is decreasing; journalistic accounts suggest that it is increasing. Academic accounts suggest that the majority of cases of child sexual abuse are perpetrated by family members; journalistic accounts focus on abuse by institutional figures (teachers, priests) or by strangers. Academic accounts have shown that innocent sexual play is a normal part of childhood development; journalistic accounts suggest that any sexual play is either a sign of abuse, or in itself constitutes sexual abuse. Academic accounts suggest that one of the best ways to prevent sexual abuse is for children to receive sex education; journalistic accounts suggest that children finding out about sex leads to sexual abuse. Academic accounts can gather data from the victims; journalistic accounts are excluded from doing so. Academic researchers talk to abusers in order to understand how child sexual abuse can be prevented; journalistic accounts exclude the voices of child sexual abusers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to identify and recommend the emergence of an academic research methodology for Journalism the academic discipline, through reviewing various journalistic methods of research – those making up a key element in such methodology. Its focus is on journalistic styles of work employed in academic contexts especially research on mass media issues. It proposes that channelling such activity into disciplined academic forms will enhance both: allowing the former to provide more durable and deeper outcomes, injecting additional energy and intensity of purpose into the latter. It will briefly consider characteristics of research methodologies and methods, generally; characteristics of the Journalism discipline, and its relationship with mass media industries and professions. The model of journalism used here is the Western liberal stream. A proposition is made, that teaching and research in universities focused on professional preparation of journalists, has developed so that it is a mature academic discipline. Its adherents are for the most part academics with background in journalistic practice, and so able to deploy intellectual skills of journalists, while also accredited with Higher Degrees principally in humanities. Research produced in this discipline area stands to show two characteristics: (a) it employs practices used generally in academic research, e.g. qualitative research methods such as ethnographic studies or participant observation, or review of documents including archived media products, and (b) within such contexts it may use more specifically journalistic techniques, e.g. interviewing styles, reflection on practice of journalism, and in creative practice research, journalistic forms of writing – highlighting journalistic / practitioner capabilities of the author. So the Journalism discipline, as a discipline closely allied to a working profession, is described as one where individual professional skills and background preparation for media work will be applicable to academic research. In this connection the core modus operandi will be the directly research-related practices of: insistent establishment of facts, adept crafting of reportage, and economising well with time. Prospective fields for continuing research are described:- work in new media; closer investigation of relations among media producers and audiences; journalism as creative practice, and general publishing by journalists, e.g. writing histories.