999 resultados para Distinguished Set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

What was Cronulla about? What really prompted 5,000 people to take the beach to bash people of 'Middle Eastern' appearance? When Macquarie Fields exploded into flames as Molotov cocktails were hurled at police, was it just a car crash that provoked the residents? Why did the Indigenous community on Palm Island react so violently to Mulrunji's death in custody? In this detailed examination of case studies, a distinguished group of experts demystifies the social processes of moral panic in Australia. Seventeen chapters explore not only the salience of the notion of moral panic in contemporary Australia, but also the relevance of moral panics in Australian history, the impact of new communication technologies and the demonisation of social categories, such as cultural minorities. Set as a text for university students, this book is a fascinating read for all those who want to go behind the hysteria, the headlines and the sound bites

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This volume represents teh second collection of working papers and articles by participants in the Higher Education Policy Project (HEPP), a project funded by the Australian Research Council and based in the Graduate School of Education at the University of Queensland. The first volume, 'Higher Education in Transition: Working Papers of the Higher Education Policy Project (Bella, McCollow and Knight, 1993), took the broad theme of "higher education in transition" in order to introduce readers the HEPP and give them some idea of the breadth of the research being pursued by the HEPP research team itself and by the cohort of post-graduate students also associated with the project. Since then, higher education has remained in transition. Stubborn and resurgent questions continue: such as what a university ought to be, what forms of research should be supported in a mass system, and how institutional accountability can be demonstrated. In differing ways and using a variety of research perspectives and methodologies, the contributors to this volume explore these and other questions of relevance to higher education today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The crystal structures of the 1:1 proton-transfer compounds of isonipecotamide (piperidine-4-carboxamide) with the monocyclic heteroaromatic carboxylic acids, isonicotinic acid, picolinic acid, dipicolinic acid and pyrazine-2,3-dicarboxylic acid have been determined at 200 K and their hydrogen-bonding patterns examined. The compounds are respectively anhydrous 4-carbamoylpiperidinium pyridine-4-carboxylate (1), the partial hydrate 4-carbamoylpiperidinium pyridine-2-carboxylate 0.25 water (2), the solvate 4-carbamoylpiperidinium 6-carboxypyridine-2-carboxylate methanol monosolvate (3), and anhydrous 4-carbamoylpiperidinium 3-carboxypyrazine-2-carboxylate (4). In compounds 1 and 3, hydrogen-bonding interactions give two-dimensional sheet structures which feature enlarged cyclic ring systems, while in compounds 2 and 4, three-dimensional structures are found. The previously described cyclic R2/2(8) hydrogen-bonded amide-amide dimer is present in 2 and 3. The hydrogen-bonding in 2 involves the partial-occupancy water molecule while the structure of 4 is based on inter-linked homomolecular hydrogen-bonded cation-cation and anion-anion associated chains comprising head-to-tail interactions. This work further demonstrates the utility of the isonipecotamide cation in the generation of chemically stable hydrogen-bonded systems, particularly with aromatic carboxylate anions, providing crystalline solids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research interest in pedestrian behaviour spans the retail industry, emergency services, urban planners and other agencies. Most models to simulate and model pedestrian movement can be distinguished on the basis of geographical scale, from the micro-scale movement of obstacle avoidance, through the meso-scale of individuals planning multi-stop shopping trips, up to the macro-scale of overall flow of masses of people between places. In this paper, route-choice decision-making model is devised for modelling passengers flow in airport terminal. A set of devised advanced traits of passengers is firstly proposed. Advanced traits take into account a passenger’s cognitive preferences and demonstrate underlying motivations of route-choice decisions. Although the activities of passengers are normally regarded as stochastic and sometimes unpredictable, real scenarios of passenger flows are basically feasible to be compared with virtual simulations in terms of tactical route-choice decision-making. Passengers in the model are as intelligent agents who possess a bunch of initial basic traits and are categorized into five distinguish groups in terms of routing preferences. Route choices are consecutively determined by inferring current advanced traits according to the utility matrix.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system restoration after a large area outage involves many factors, and the procedure is usually very complicated. A decision-making support system could then be developed so as to find the optimal black-start strategy. In order to evaluate candidate black-start strategies, some indices, usually both qualitative and quantitative, are employed. However, it may not be possible to directly synthesize these indices, and different extents of interactions may exist among these indices. In the existing black-start decision-making methods, qualitative and quantitative indices cannot be well synthesized, and the interactions among different indices are not taken into account. The vague set, an extended version of the well-developed fuzzy set, could be employed to deal with decision-making problems with interacting attributes. Given this background, the vague set is first employed in this work to represent the indices for facilitating the comparisons among them. Then, a concept of the vague-valued fuzzy measure is presented, and on that basis a mathematical model for black-start decision-making developed. Compared with the existing methods, the proposed method could deal with the interactions among indices and more reasonably represent the fuzzy information. Finally, an actual power system is served for demonstrating the basic features of the developed model and method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Student engagement is a key contributor to student achievement and retention. Increasingly, international and Australasian universities are introducing a range of specific initiatives aimed at monitoring and intervening with students who are at risk of disengaging, particularly in their first year of study. A multi-site case study formed the focus of a national learning and teaching project to develop a suite of resources to guide good practice for safeguarding student learning engagement that were consistent with the notions of equity and social justice. Pivotal to the suite of resources is the Social Justice Framework and a set of social justice principles that emerged through a synthesis of existing literature and were further refined through the examination of qualitative data collected across the participating institutions. These social justice principles reflect general notions of equity and social justice, embrace the philosophical position of recognitive social justice, and are presented in an interconnected and co-dependent way within the framework. Participants will be provided with the opportunity to identify and discuss the practical applications of the principles to student engagement activities in their own institutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visitors to prison are generally innocent of committing crime, but their interaction with inmates has been studied as a possible incentive to reduce recidivism. The way visitors’ centres are currently designed takes in consideration mainly security principles and the needs of guards or prison management. The human experience of the relatives or friends aiming to provide emotional support to inmates is usually not considered; facilities have been designed with an approach that often discourages people from visiting. This paper discusses possible principles to design prison visitors’ centres taking in consideration practical needs, but also human factors. A comparative case study analysis of different secure typologies, like libraries, airports or children hospitals, provides suggestions about how to approach the design of prison in order to ensure the visitor is not punished for the crimes of those they are visiting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question as to whether poser race affects the happy categorization advantage, the faster categorization of happy than of negative emotional expressions, has been answered inconsistently. Hugenberg (2005) found the happy categorization advantage only for own race faces whereas faster categorization of angry expressions was evident for other race faces. Kubota and Ito (2007) found a happy categorization advantage for both own race and other race faces. These results have vastly different implications for understanding the influence of race cues on the processing of emotional expressions. The current study replicates the results of both prior studies and indicates that face type (computer-generated vs. photographic), presentation duration, and especially stimulus set size influence the happy categorization advantage as well as the moderating effect of poser race.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The refereed papers contained in this set of conference proceedings were presented at the 2nd International Conference on Crime, Justice and Social Democracy, hosted by the Crime and Justice Research Centre, Faculty of Law, QUT. The conference attracted an impressive list of internationally distinguished keynote and panel speakers from the United Kingdom, United States, Australia, New Zealand, Canada and this time Latin America, as well as high quality paper submissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Textual document set has become an important and rapidly growing information source in the web. Text classification is one of the crucial technologies for information organisation and management. Text classification has become more and more important and attracted wide attention of researchers from different research fields. In this paper, many feature selection methods, the implement algorithms and applications of text classification are introduced firstly. However, because there are much noise in the knowledge extracted by current data-mining techniques for text classification, it leads to much uncertainty in the process of text classification which is produced from both the knowledge extraction and knowledge usage, therefore, more innovative techniques and methods are needed to improve the performance of text classification. It has been a critical step with great challenge to further improve the process of knowledge extraction and effectively utilization of the extracted knowledge. Rough Set decision making approach is proposed to use Rough Set decision techniques to more precisely classify the textual documents which are difficult to separate by the classic text classification methods. The purpose of this paper is to give an overview of existing text classification technologies, to demonstrate the Rough Set concepts and the decision making approach based on Rough Set theory for building more reliable and effective text classification framework with higher precision, to set up an innovative evaluation metric named CEI which is very effective for the performance assessment of the similar research, and to propose a promising research direction for addressing the challenging problems in text classification, text mining and other relative fields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.