930 resultados para BIFURCATION SET


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decision of the District Court of Queensland in Mark Treherne & Associates -v- Murray David Hopkins [2010] QDC 36 will have particular relevance for early career lawyers. This decision raises questions about the limits of the jurisdiction of judicial registrars in the Magistrates Court.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A recent District Court case is believed to be the first in Queensland in which UCPR r 5 has been used to support the setting aside of a regularly entered default judgment without a costs order.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application before the court in Millerview Constructions Pty Ltd v Palmer Plumbing Pty Ltd [2008] QSC 005 raised a significant question regarding the appropriate construction of s 459G of the Corporations Act 2001 (Cth) (the Act). The decision emphasises the importance of ensuring that any application to set aside a statutory demand must be served in a timely way on the creditor at the creditor’s address for service as stated in the statutory demand, or in strict compliance with another manner authorised by the Act.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This volume represents teh second collection of working papers and articles by participants in the Higher Education Policy Project (HEPP), a project funded by the Australian Research Council and based in the Graduate School of Education at the University of Queensland. The first volume, 'Higher Education in Transition: Working Papers of the Higher Education Policy Project (Bella, McCollow and Knight, 1993), took the broad theme of "higher education in transition" in order to introduce readers the HEPP and give them some idea of the breadth of the research being pursued by the HEPP research team itself and by the cohort of post-graduate students also associated with the project. Since then, higher education has remained in transition. Stubborn and resurgent questions continue: such as what a university ought to be, what forms of research should be supported in a mass system, and how institutional accountability can be demonstrated. In differing ways and using a variety of research perspectives and methodologies, the contributors to this volume explore these and other questions of relevance to higher education today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The crystal structures of the 1:1 proton-transfer compounds of isonipecotamide (piperidine-4-carboxamide) with the monocyclic heteroaromatic carboxylic acids, isonicotinic acid, picolinic acid, dipicolinic acid and pyrazine-2,3-dicarboxylic acid have been determined at 200 K and their hydrogen-bonding patterns examined. The compounds are respectively anhydrous 4-carbamoylpiperidinium pyridine-4-carboxylate (1), the partial hydrate 4-carbamoylpiperidinium pyridine-2-carboxylate 0.25 water (2), the solvate 4-carbamoylpiperidinium 6-carboxypyridine-2-carboxylate methanol monosolvate (3), and anhydrous 4-carbamoylpiperidinium 3-carboxypyrazine-2-carboxylate (4). In compounds 1 and 3, hydrogen-bonding interactions give two-dimensional sheet structures which feature enlarged cyclic ring systems, while in compounds 2 and 4, three-dimensional structures are found. The previously described cyclic R2/2(8) hydrogen-bonded amide-amide dimer is present in 2 and 3. The hydrogen-bonding in 2 involves the partial-occupancy water molecule while the structure of 4 is based on inter-linked homomolecular hydrogen-bonded cation-cation and anion-anion associated chains comprising head-to-tail interactions. This work further demonstrates the utility of the isonipecotamide cation in the generation of chemically stable hydrogen-bonded systems, particularly with aromatic carboxylate anions, providing crystalline solids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system restoration after a large area outage involves many factors, and the procedure is usually very complicated. A decision-making support system could then be developed so as to find the optimal black-start strategy. In order to evaluate candidate black-start strategies, some indices, usually both qualitative and quantitative, are employed. However, it may not be possible to directly synthesize these indices, and different extents of interactions may exist among these indices. In the existing black-start decision-making methods, qualitative and quantitative indices cannot be well synthesized, and the interactions among different indices are not taken into account. The vague set, an extended version of the well-developed fuzzy set, could be employed to deal with decision-making problems with interacting attributes. Given this background, the vague set is first employed in this work to represent the indices for facilitating the comparisons among them. Then, a concept of the vague-valued fuzzy measure is presented, and on that basis a mathematical model for black-start decision-making developed. Compared with the existing methods, the proposed method could deal with the interactions among indices and more reasonably represent the fuzzy information. Finally, an actual power system is served for demonstrating the basic features of the developed model and method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Student engagement is a key contributor to student achievement and retention. Increasingly, international and Australasian universities are introducing a range of specific initiatives aimed at monitoring and intervening with students who are at risk of disengaging, particularly in their first year of study. A multi-site case study formed the focus of a national learning and teaching project to develop a suite of resources to guide good practice for safeguarding student learning engagement that were consistent with the notions of equity and social justice. Pivotal to the suite of resources is the Social Justice Framework and a set of social justice principles that emerged through a synthesis of existing literature and were further refined through the examination of qualitative data collected across the participating institutions. These social justice principles reflect general notions of equity and social justice, embrace the philosophical position of recognitive social justice, and are presented in an interconnected and co-dependent way within the framework. Participants will be provided with the opportunity to identify and discuss the practical applications of the principles to student engagement activities in their own institutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visitors to prison are generally innocent of committing crime, but their interaction with inmates has been studied as a possible incentive to reduce recidivism. The way visitors’ centres are currently designed takes in consideration mainly security principles and the needs of guards or prison management. The human experience of the relatives or friends aiming to provide emotional support to inmates is usually not considered; facilities have been designed with an approach that often discourages people from visiting. This paper discusses possible principles to design prison visitors’ centres taking in consideration practical needs, but also human factors. A comparative case study analysis of different secure typologies, like libraries, airports or children hospitals, provides suggestions about how to approach the design of prison in order to ensure the visitor is not punished for the crimes of those they are visiting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question as to whether poser race affects the happy categorization advantage, the faster categorization of happy than of negative emotional expressions, has been answered inconsistently. Hugenberg (2005) found the happy categorization advantage only for own race faces whereas faster categorization of angry expressions was evident for other race faces. Kubota and Ito (2007) found a happy categorization advantage for both own race and other race faces. These results have vastly different implications for understanding the influence of race cues on the processing of emotional expressions. The current study replicates the results of both prior studies and indicates that face type (computer-generated vs. photographic), presentation duration, and especially stimulus set size influence the happy categorization advantage as well as the moderating effect of poser race.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Textual document set has become an important and rapidly growing information source in the web. Text classification is one of the crucial technologies for information organisation and management. Text classification has become more and more important and attracted wide attention of researchers from different research fields. In this paper, many feature selection methods, the implement algorithms and applications of text classification are introduced firstly. However, because there are much noise in the knowledge extracted by current data-mining techniques for text classification, it leads to much uncertainty in the process of text classification which is produced from both the knowledge extraction and knowledge usage, therefore, more innovative techniques and methods are needed to improve the performance of text classification. It has been a critical step with great challenge to further improve the process of knowledge extraction and effectively utilization of the extracted knowledge. Rough Set decision making approach is proposed to use Rough Set decision techniques to more precisely classify the textual documents which are difficult to separate by the classic text classification methods. The purpose of this paper is to give an overview of existing text classification technologies, to demonstrate the Rough Set concepts and the decision making approach based on Rough Set theory for building more reliable and effective text classification framework with higher precision, to set up an innovative evaluation metric named CEI which is very effective for the performance assessment of the similar research, and to propose a promising research direction for addressing the challenging problems in text classification, text mining and other relative fields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.