965 resultados para dependency claim


Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the growth in project management as a form of work organisation in many sectors of the economy has come the significant rise in the number of project managers and project team members. This change in work organisation brings issues in forging career paths and determining career support in work situations that are often dynamic, short lived and intense. In the relatively small but substantially robust Australian economy, a unique labour market and the tyranny of distance bring their own difficulties. Innovative and collaborative project structures and increasing prevalence of contract work provide both challenges and opportunities for new career pathways in many industries. A growing percentage of Australia's workforce is employed in project-based or project-oriented organisations, leading to the claim that Australia is a project-based economy. This provided a context for our research into the career paths and the issues of career management for project managers working in a project based economy. Using in-depth interviews with project managers from three industry areas we found generational and gender differences in experiences of work, workplace support and mentoring for career development. For a continued strong performance in this economy,organisations that employ project personnel will need to consider how they will ensure the supply of high quality project professionals into the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In their controversial paper 'After-birth abortion', Alberto Giubilini and Francesca Minerva argue that there is no rational basis for allowing abortion but prohibiting infanticide ('after-birth abortion'). We ought in all consistency either to allow both or prohibit both. This paper rejects their claim, arguing that much-neglected considerations in philosophical discussions of this issue are capable of explaining why we currently permit abortion in some cases, while prohibiting infanticide.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Within political and social arenas, prostitution continues to be a highly contested and debated issue. Generally conceptualised as a ‘problem’ in need of eradication, prostitution is strongly linked to immorality and deviance. The methods of addressing this phenomenon have experienced a shift from focusing predominantly on the sex worker, to directly targeting the clients of commercial sex. Such practices have resulted in the creation of policy initiatives such as ‘John Schools’—diversionary programs for clients, or ‘Johns’ who have been arrested for prostitution offences. The programs aim to educate participants on the various harms and risks associated with such behaviour and claim to offer a means to reduce prostitution by targeting the demand for sexual services. It is evident however, that these programs perpetuate traditional social constructions of prostitution, characterising the act, and the actors, as sexually deviant. This paper examines the curriculum of these programs in order to identify how prostitution is constructed—firstly through the depiction of the victims in the program and secondly through the characterisation of prostitution offenders—and argues that such initiatives merely extend the charge of sexual deviance from the sellers of sex to the buyers,whilst failing to acknowledge autonomy and choice for sex workers and clients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Understanding the mechanical properties of tendon is an important step to guiding the process of improving athletic performance, predicting injury and treating tendinopathies. The speed of sound in a medium is governed by the bulk modulus and density for fluids and isotropic materials. However, for tendon,which is a structural composite of fluid and collagen, there is some anisotropy requiring an adjustment for Poisson’s ratio. In this paper, these relationships are explored and modelled using data collected, in vivo, on human Achilles tendon. Estimates for elastic modulus and hysteresis based on speed of sound data are then compared against published values from in vitro mechanical tests. Methods: Measurements using clinical ultrasound imaging, inverse dynamics and acoustic transmission techniques were used to determine dimensions, loading conditions and longitudinal speed of sound for the Achilles tendon during a series of isometric plantar flexion exercises against body weight. Upper and lower bounds for speed of sound versus tensile stress in the tendon were then modelled and estimates derived for elastic modulus and hysteresis. Results: Axial speed of sound varied between 1850 to 2090 m.s−1 with a non-linear, asymptotic dependency on the level of tensile stress in the tendon 5–35 MPa. Estimates derived for the elastic modulus ranged between 1–2 GPa. Hysteresis derived from models of the stress-strain relationship, ranged from 3–11%. These values agree closely with those previously reported from direct measurements obtained via in vitro mechanical tensile tests on major weight bearing tendons. Discussion: There is sufficiently good agreement between these indirect (speed of sound derived) and direct (mechanical tensile test derived) measures of tendon mechanical properties to validate the use of this non-invasive acoustic transmission technique. This non-invasive method is suitable for monitoring changes in tendon properties as predictors of athletic performance, injury or therapeutic progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an alternative approach to image segmentation by using the spatial distribution of edge pixels as opposed to pixel intensities. The segmentation is achieved by a multi-layered approach and is intended to find suitable landing areas for an aircraft emergency landing. We combine standard techniques (edge detectors) with novel developed algorithms (line expansion and geometry test) to design an original segmentation algorithm. Our approach removes the dependency on environmental factors that traditionally influence lighting conditions, which in turn have negative impact on pixel-based segmentation techniques. We present test outcomes on realistic visual data collected from an aircraft, reporting on preliminary feedback about the performance of the detection. We demonstrate consistent performances over 97% detection rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Boards of directors are key governancemechanisms in organizations and fulfill twomain tasks:monitoringmanagers and firm performance, and providing advice and access to resources. In spite of a wealth of researchmuch remains unknown about how boards attend to the two tasks. This study investigates whether organizational (firm profitability) and environmental factors (industry regulation) affect board task performance. The data combine CEOs' responses to a questionnaire, and archival data from a sample of large Italian firms. Findings show that past firm performance is negatively associatedwith board monitoring and advice tasks; greater industry regulation enhances perceived board task performance; board monitoring and advice tasks tend to reinforce each other, despite their theoretical and practical distinction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pedagogical styles, methods, models, practices or strategies are valued for what they claim they can achieve. In recent times curriculum documents and governments have called for a range of teaching approaches to meet the variety of learner differences and allow students to make more independent decision making in physical education (Hardy and Mawer, 1999). One well known system of categorizing teaching styles is the Mosston and Ashworth’s Spectrum of Teaching Styles (2002). In Queensland, prior to 2005, no research had been conducted on the teaching styles used by teachers of Physical Education. However, many teachers self-reported that they employed a variety of teaching styles depending on the aims and content of the material to be taught (Cothran, et al., 2005). This research, for the first time, collected teacher’s self-reported use of teaching styles and through observations verify the styles that were being used to teach Senior Physical Education in Queensland. More specifically the aims of the research were to determine: a) What teaching styles teachers of Senior Physical Education in Queensland believe they use? i) Were they using a range of teaching styles? ii) Were teachers of Senior Physical Education in Queensland using teaching styles that the Queensland Senior Physical Education Syllabus (2004) required? b) If Mosston and Ashworth’s (2002) Spectrum of Teaching Styles were used to categorise styles observed during the teaching of Senior Physical Education did the styles being used provide opportunities for evaluating as described by the Queensland Senior Physical Education Syllabus (2004)? The research was conducted in two phases. Part A involved use of a questionnaire to determine the teaching styles Queensland teachers of Senior Physical Education reported using and how often they reported using them. The questionnaire was administered to 110 teachers throughout Queensland. The sample was determined from 346 schools teaching Senior Physical Education (in 2006) across the state of Queensland, Australia. 286 questionnaires were sent to 77 non-randomised schools. There were 66 male and 44 female respondents in the sample. A wide range of teaching styles were reportedly used by teachers of Senior Physical Education with Practice Style-Style B, Command Style-Style A and Divergent Discovery Style-Style H, the most reportedly used. The Self-Teaching Style-Style K was reportedly used the least by teachers involved in this study. From the respondents a group of teachers were identified to form the participants for Part B. Part B of the study involved observation of a group of volunteer participants (from those who had completed the questionnaire) who displayed many of the ‘typical’ characteristics, and a cross-section of backgrounds, of teachers of Senior Physical Education in Queensland. In the case of this study, the criteria used to select the group of teachers to be observed teaching were, teaching experience (number of years: 0-4, 5-10 and 11 years and over), gender, geographical location of schools (focused on Brisbane and near area for travel/access purposes), profile of the students at schools (girls, boys or co-educational), nature of school (Government or Private) and the physical activities being taught in a school (activities to reflect all the areas of physical activity outlined within the syllabus). A total of 27 questionnaire respondents from Part A indicated that they were willing to be observed teaching practical lessons. The respondents who volunteered to be involved in Part B of the study came from different regions across the state of Queensland and was not confined to the Brisbane metropolitan area or large cities. From the group of people who volunteered for Part B four came from outside Brisbane and 23 from the Brisbane area. The final observation group of nine participants included eight teachers from the Brisbane area and one from a rural area. The characteristics of the final group included three females and six males from private and public schools with a range of teaching experience in years and a range of physical activities. Four year 12 and five year 11 teachers and their classes were videoed on three occasions as they progressed through an eight – nine week unit of work. This resulted in 24 hours 48 minutes and 20 seconds (or 4465 observations) of video teaching data which was subsequently coded by several researchers (99% interobserver reliability) to determine the teaching styles employed by the participants. This research indicated that, based on Mosston and Ashworth’s (2002) Spectrum of Teaching Styles, teachers of Senior Physical Education in Queensland used predominantly one style to teach 27 observed lessons. This is in sharp contrast to the variety of styles 110 teachers self- reportedly used and in spite of the Queensland Senior Physical Education Syllabus (2004) suggesting a range of specific styles be used. These results are discussed in the context of the Queensland Senior Physical Education Syllabus (2004), teacher knowledge of teaching styles and high-stakes curriculum and external pressures such as national testing and the publication of data from schools in tabloid newspapers. The data and findings in this research provide a rationale for improving teacher knowledge regarding teaching styles and the need for a clear definition of terminology in syllabus documents. Careful examination of the effects that the publishing of school data may have on teaching styles is advised. This research not only collected teacher’s perceptions of the teaching styles they believed they used it also verified these claims through direct observations of the teachers while teaching. These findings are relevant to syllabus writers, teacher educators, policy makers within education and teachers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A user’s query is considered to be an imprecise description of their information need. Automatic query expansion is the process of reformulating the original query with the goal of improving retrieval effectiveness. Many successful query expansion techniques ignore information about the dependencies that exist between words in natural language. However, more recent approaches have demonstrated that by explicitly modeling associations between terms significant improvements in retrieval effectiveness can be achieved over those that ignore these dependencies. State-of-the-art dependency-based approaches have been shown to primarily model syntagmatic associations. Syntagmatic associations infer a likelihood that two terms co-occur more often than by chance. However, structural linguistics relies on both syntagmatic and paradigmatic associations to deduce the meaning of a word. Given the success of dependency-based approaches and the reliance on word meanings in the query formulation process, we argue that modeling both syntagmatic and paradigmatic information in the query expansion process will improve retrieval effectiveness. This article develops and evaluates a new query expansion technique that is based on a formal, corpus-based model of word meaning that models syntagmatic and paradigmatic associations. We demonstrate that when sufficient statistical information exists, as in the case of longer queries, including paradigmatic information alone provides significant improvements in retrieval effectiveness across a wide variety of data sets. More generally, when our new query expansion approach is applied to large-scale web retrieval it demonstrates significant improvements in retrieval effectiveness over a strong baseline system, based on a commercial search engine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I believe that studies of men's gendered experiences of information systems are needed. In order to support this claim, I introduce the area of Masculinity Studies to Information Systems research and, using this, present an exploratory analysis of an internet dating website for gay men – Gaydar. The information system, which forms part of the Gaydar community, is shown to shape, and be shaped by the members as they accept and challenge aspects of it as related to their identities. In doing this, I show how the intertwined processes of information systems development and use contribute to the creation of diverse interpretations of masculinity within a group of men. In sum, my analysis highlights different kinds of men and different versions of masculinity that can sometimes be associated with different experiences of information systems. The implications of this work centre on the need to expand our knowledge of men's gendered experiences with information systems, to reflect upon processes of technology facilitated categorisation and to consider the influences that contribute to the roll out of particular software features along with the underlying rationales for market segmentation in the software and software-based services industries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter investigates the relationship between technical and operational skills and the development of conceptual knowledge and literacy in Media Arts learning. It argues that there is a relationship between the stories, expressions and ideas that students aim to produce with communications media, and their ability to realise these in material form through technical processes in specific material contexts. Our claim is that there is a relationship between the technical and the operational, along with material relations and the development of conceptual knowledge and literacy in media arts learning. We place more emphasis on the material aspects of literacy than is usually the case in socio-cultural accounts of media literacy. We provide examples from a current project to demonstrate that it is just as important to address the material as it is the discursive and conceptual when considering how students develop media literacy in classroom spaces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business process management systems (BPMS) belong to a class of enterprise information systems that are characterized by the dependence on explicitly modeled process logic. Through the process logic, it is relatively easy to manage explicitly the routing and allocation of work items along a business process through the system. Inspired by the DeLone and McLean framework, we theorize that these process-aware system features are important attributes of system quality, which in turn will elevate key user evaluations such as perceived usefulness, and usage satisfaction. We examine this theoretical model using data collected from four different, mostly mature BPM system projects. Our findings validate the importance of input quality as well as allocation and routing attributes as antecedents of system quality, which, in turn, determines both usefulness and satisfaction with the system. We further demonstrate how service quality and workflow dependency are significant precursors to perceived usefulness. Our results suggest the appropriateness of a multi-dimensional conception of system quality for future research, and provide important design-oriented advice for the design and configuration of BPMSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many successful query expansion techniques ignore information about the term dependencies that exist within natural language. However, researchers have recently demonstrated that consistent and significant improvements in retrieval effectiveness can be achieved by explicitly modelling term dependencies within the query expansion process. This has created an increased interest in dependency-based models. State-of-the-art dependency-based approaches primarily model term associations known within structural linguistics as syntagmatic associations, which are formed when terms co-occur together more often than by chance. However, structural linguistics proposes that the meaning of a word is also dependent on its paradigmatic associations, which are formed between words that can substitute for each other without effecting the acceptability of a sentence. Given the reliance on word meanings when a user formulates their query, our approach takes the novel step of modelling both syntagmatic and paradigmatic associations within the query expansion process based on the (pseudo) relevant documents returned in web search. The results demonstrate that this approach can provide significant improvements in web re- trieval effectiveness when compared to a strong benchmark retrieval system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Madeira vine (Anredera cordifolia (Ten.) Steenis) is a climber in the angiosperm family Basellaceae. It is native to South America and has naturalised in Australia. It is regarded as a serious environmental weed because of the structural damage it causes to native vegetation. The present study, for the first time, documents anatomical and morphological traits of the leaves of A. cordifolia and considers their implications for its ecology and physiology. Plants were grown under three different light levels, and anatomical and morphological leaf characters were compared among light levels, among cohorts, and with documented traits of the related species, Basella alba L. Stomata were present on both the adaxial and abaxial sides of the leaf, with significantly more stomata on the abaxial side and under high light. This may account for the ability of this species to fix large amounts of carbon and rapidly respond to light gaps. The leaves had very narrow veins and no sclerenchyma, suggesting a low construction cost that is associated with invasive plants. There was no significant difference in any of the traits among different cohorts, which agrees with the claim that A. cordifolia primarily propagates vegetatively. The anatomy and morphology of A. cordifolia was similar to that of B. alba.