875 resultados para State symbols and flags
Resumo:
The emerging ‘responsibility to protect’ (R2P) principle presents a significant challenge to the BRICS (Brazil, Russia, India, China and South Africa) states’ traditional emphasis on a strict Westphalian understanding of state sovereignty and non-interference in domestic affairs. Despite formally endorsing R2P at the 2005 World Summit, each of the BRICS has, to varying degrees, retained misgivings about coercive measures under the doctrine’s third pillar. This paper examines how these rising powers engaged with R2P during the 2011–2012 Libyan and Syrian civilian protection crises. The central finding is that although all five states expressed similar concerns over NATO’s military campaign in Libya, they have been unable to maintain a common BRICS position on R2P in Syria. Instead, the BRICS have splintered into two sub-groups. The first, consisting of Russia and China, remains steadfastly opposed to any coercive measures against Syria. The second, comprising the democratic IBSA states (India, Brazil and South Africa) has displayed softer, more flexible stances towards proposed civilian protection measures in Syria, although these three states also remain cautious about the implementation of R2P’s coercive dimension. This paper identifies a number of factors which help to explain this split, arguing that the failure to maintain a cohesive BRICS position on R2P is unsurprising given the many internal differences and diverging national interests between the BRICS members. Overall, the BRICS’ ongoing resistance to intervention is unlikely to disappear quickly, indicating that further attempts to operationalize R2P’s third pillar may prove difficult.
Resumo:
Bus Rapid Transit (BRT) station is the interface between passenger and service. The station is crucial to line operation as it is typically the only location where buses can pass each other. Congestion may occur here when buses maneuvering into and out of the platform lane interfere with bus flow, or when a queue of buses forms upstream of the platform lane blocking the passing lane. However, some systems include operation where express buses pass the critical station, resulting in a proportion of non stopping buses. It is important to understand the operation of the critical busway station under this type of operation, as it affects busway line capacity. This study uses micro simulation to treat the BRT station operation and to analyze the relationship between station Limit state bus capacity (B_ls), Total Bus Capacity (B_ttl). First, the simulation model is developed for Limit state scenario and then a mathematical model is defined, calibrated for a specified range of controlled scenarios of mean and coefficient of variation of dwell time. Thereafter, the proposed B_ls model is extended to consider non stopping buses and B_ttlmodel is defined. The proposed models provides better understanding to the BRT line capacity and is useful for transit authorities for designing better BRT operation.
Resumo:
The increasing global distribution of automobiles necessitates that the design of In-vehicle Information Systems (IVIS) is appropriate for the regions to which they are being exported. Differences between regions such as culture, environment and traffic context can influence the needs, usability and acceptance of IVIS. This paper describes two studies aimed at identifying regional differences in IVIS design needs and preferences across drivers from Australia and China to determine the impact of any differences on IVIS design. Using a questionnaire and interaction clinics, the influence of cultural values and driving patterns on drivers' preferences for, and comprehension of, surface- and interaction-level aspects of IVIS interfaces was explored. Similarities and differences were found between the two regional groups in terms of preferences for IVIS input control types and labels and in the comprehension of IVIS functions. Specifically, Chinese drivers preferred symbols and Chinese characters over English words and were less successful (compared to Australians) at comprehending English abbreviations, particularly for complex IVIS functions. Implications in terms of the current trend to introduce Western-styled interfaces into other regions with little or no adaptation are discussed.
Resumo:
This paper explores why some complaints of sexual harassment lodged under Australian anti-discrimination laws might settle during the conciliation process while others do not. It draws on an analysis of data collected from files of sexual harassment complaints lodged with all state, territory and federal human rights agencies in the area of employment over a six month period. The analysis suggests that complaints that conform with the stereotypical image of sexual harassment, where a woman is physically sexually harassed by a senior man, are more likely to settle as are complaints where the complainant is in full-time, secure employment and where complainants are not legally represented. However, sustained Australian research, including by human rights agencies, is vital is to further explore these issues.
Resumo:
While user-generated short online videos have existed since the emergence of video sharing sites in China, they have undergone a process of formalisation and commercialisation, culminating in the wave of micro-movies in recent years. By addressing the wider context of globalisation alongside relevant state policies and shifting viewing habits, this article analyses the local and global causes of this wave. It offers evidence that illustrates how online video service providers in China have adapted in a changing industry landscape as they negotiate state policies, advertiser interests and user preference. It then examines the production and distribution dynamics, where professional producers draw on social media, grassroots creativity and creative talents in regional markets. Finally, it discusses the cultural implications of this process in terms of both the nature and flow of creativity. Based on these analyses, the article also sheds light on the interplay between the state and the market in the context of globalisation and marketisation of media sectors, which becomes more complicated when the state-owned or controlled media enter the emerging market sectors.
Resumo:
The importance of applying unsaturated soil mechanics to geotechnical engineering design has been well understood. However, the consumption of time and the necessity for a specific laboratory testing apparatus when measuring unsaturated soil properties have limited the application of unsaturated soil mechanics theories in practice. Although methods for predicting unsaturated soil properties have been developed, the verification of these methods for a wide range of soil types is required in order to increase the confidence of practicing engineers in using these methods. In this study, a new permeameter was developed to measure the hydraulic conductivity of unsaturated soils using the steady-state method and directly measured suction (negative pore-water pressure) values. The apparatus is instrumented with two tensiometers for the direct measurement of suction during the tests. The apparatus can be used to obtain the hydraulic conductivity function of sandy soil over a low suction range (0-10 kPa). Firstly, the repeatability of the unsaturated hydraulic conductivity measurement, using the new permeameter, was verified by conducting tests on two identical sandy soil specimens and obtaining similar results. The hydraulic conductivity functions of the two sandy soils were then measured during the drying and wetting processes of the soils. A significant hysteresis was observed when the hydraulic conductivity was plotted against the suction. However, the hysteresis effects were not apparent when the conductivity was plotted against the volumetric water content. Furthermore, the measured unsaturated hydraulic conductivity functions were compared with predictions using three different predictive methods that are widely incorporated into numerical software. The results suggest that these predictive methods are capable of capturing the measured behavior with reasonable agreement.
Resumo:
This paper plots the recent changes in the uses of public space in Hanoi, Vietnam. It is argued that the economic and social changes in contemporary Vietnam have paved the way for a dramatic transformation in the ways in which streets, pavements and markets are experienced and imagined by the populace. The efflorescence of individual mobility, street-trading and public crowding around certain popular events has led to the emergence of a distinct public sphere, one which is not immune from state control and censure but which is a flagrant rebuttal of the state's appeal. The immediate struggles over space herald a new discursive arena for the contest over Vietnamese national imagery as represented in cultural heritage and public space, memorials and state-controlled events which the public are rapidly deserting. The paper concludes by suggesting that the everyday cultural practices that have created a bustling streetlife in urban Vietnam will inevitably provide the vitality and spectacle for the destabilisation of state control in a struggle for meanings in public space.
Resumo:
The pertinence of this book cannot be overemphasised. The world’s refugee crisis has reached a two‐decade high with the United Nations recently announcing that ‘displacement is the new 21st century challenge’ (UNHCR 2013). The transnational movement of dislocated peoples fleeing conflict, persecution and poverty is a global responsibility requiring nation states to collaborate for humanitarian resolutions embedded in human rights. However, in times of human rights expansionism, and the relaxation of borders for maximising free‐trade and fiscal prosperity, the movement of people experiencing immense abuse and deprivation has witnessed an increase in draconian regulation within discourses of intolerance and deterrence. Weber and Pickering cogently and emphatically emphasise the human cost of inhumane and populist government immigration and border‐entry polices underpinned by ideologies of retribution, suspicion, and demonisation. It is a moving and engaging narrative: a book that exposes state prejudice and abuse, whilst advocating for the victims who undertake perilous journeys in search of safety from lives of violence and persecution. Moreover, it is a book that pushes ideological boundaries and seeks new criminological horizons, for which the authors must be sincerely congratulated. It is a text of innovation, inspired thinking and long lasting criminological value.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
This thesis investigates how ownership structure and corporate governance relate to the post-listing liquidity of IPO firms. Using a sample of 1,049 Chinese IPOs from 2001 to 2010, the results show firms with a broader shareholder base and higher ownership concentration have greater post-listing liquidity. So do firms with higher state ownership and lower institution ownership. Corporate governance is also important; post-listing liquidity is higher for firms with CEO duality, a larger and more independent board, and more frequent board meetings. The 2005 Split Share Structure Reform, which increased the proportion of tradable shares, has a positive impact on liquidity.
Resumo:
An international early years project led by QUT and University of Iceland researchers has investigated children’s accounts of play and the teacher’s role in play in kindergarten settings. While most commonly associated with young children’s activities and the work of childhood, play is recognised also as an activity that extends over the life span, from early childhood to adulthood, and across cultures, worldwide. As shown in national and state policy and curriculum documents, play is being subjected increasingly to specific guidelines that address the physical environment and educator involvement in early years settings. Parents and educators have strong opinions regarding the value and place of play. Children also have strong views about play, although little is known about their views and what they think play encompasses, and the value of play in their everyday lives.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Under the International Health Regulations 2005 Australia is obliged to develop a domestic framework designed to equip it to respond to public health emergencies. The legislative arrangements for the declaration of a public health emergency in Australia are complex, vary across state jurisdictions and intersect with other emergency powers. The task of harmonising laws and other arrangements within a federal system poses both challenges and opportunities for flexibility and choice. This article argues that Australia's current multi-strand and multi-level response provides a coordinated framework which also accommodates desirable levels of flexibility and choice.
Resumo:
The E-CO(2) elimination reactions of alkyl hydroperoxides proceed via abstraction of an (x-hydrogen by a base: X- + (RRHCOOH)-R-1-H-2 -> HX + (RRC)-R-1-C-2=O + HO-. Efficiencies and product distributions for the reactions of the hydroxide anion with methyl, ethyl, and tert-butyl hydroperoxides are studied in the gas phase. On the basis of experiments using three isotopic analogues, HO- + CH3OOH, HO- + CD3OOH, and H18O- + CH3OOH. the overall intrinsic reaction efficiency is determined to be 80% or greater. The E(CO)2 decomposition is facile for these methylperoxide reactions, and predominates over competing proton transfer at the hydroperoxide moiety. The CH3CH2OOH reaction displays a similar E(CO)2 reactivity, whereas proton transfer and the formation of HOO- are the exclusive pathways observed for (CH3)(3)COOH, which has no (x-hydrogen. All results are consistent with the E-CO(2) mechanism, transition state structure, and reaction energy diagrams calculated using the hybrid density functional B3LYP approach. Isotope labeling for HO- + CH3OOH also reveals some interaction between H2O and HO- within the E(CO)2 product complex [H2O center dot center dot center dot CH2=O center dot center dot center dot HO-]. There is little evidence, however. for the formation of the most exothermic products H2O + CH2(OH)O-, which would arise from nuclephilic condensation of CH2=O and HO-. The results suggest that the product dynamics are not totally statistical but are rather direct after the E-CO(2) transition state. The larger HO- + CH3CH2OOH system displays more statistical behavior during complex dissociation.
Resumo:
Despite considerable state investment and initiatives, binge drinking is still a major behavioral problem for policy makers and communities in many parts of the world. Furthermore, the practice of bingeing on alcohol seems to be spreading to young people in countries traditionally considered to have moderate drinking behaviors. Using a sociocultural lens and a framework of sociocultural themes from previous literature to develop propositions from their empirical study, the authors examine binge-drinking attitudes and behaviors among young people from high and moderate binge-drinking countries. The authors then make proposals regarding how policy makers can use social marketing more effectively to contribute to behavior change. Qualitative interviews were conducted with 91 respondents from 22 countries who were studying in two high binge-drinking countries at the time. The results show support for three contrasting sociocultural propositions that identify influences on binge drinking across these countries.