953 resultados para Fred Ryan


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides insight into writing scholarly research articles by working collaboratively in teams. Collaborative writing is increasingly common practice within organizational and university contexts. While there is a growing volume of literature which examines various aspects of collaborative writing from challenges to politics, less attention is paid to practical aspects of how to write in teams, particularly within the context of research training. The article examines practical approaches to collaborative writing, and delineates primary continuities and disjunctions between ‘traditional collaboration’ relying largely upon physical face-to-face meetings, and ‘virtual teams’ which are geographically or organizationally dispersed and communicate via virtual, mobile, online or telephony enabled communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper analyses the expenditure patterns of 97 Australian international aid and development organisations, and examines the extent to which they disclose information about their expenditure in order to discharge their accountability. Not-for-profit (NFP) expenditure attracts media attention, with perceptions of excessive costs potentially damaging stakeholder trust in NFP organisations. This makes it important for organisations to be proactive in communicating their expenditure stories to stakeholders, rather than being judged on their performance by standardised expenditure metrics. By highlighting what it costs to ensure longer-term operational capability, NFP organisations will contribute to the discharge of their financial accountability and play a part in educating all stakeholders about the dangers of relying on a single metric.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

JUST like the man, Ned Kelly dramas have had a chequered history. A century ago they were banned from the stage and screen. Following censorship law changes, Douglas Stewart's 4 1/2-hour long 1942 radio play was a hit on the airwaves but a flop onstage. Stewart's Ned was a menacing hero/villain. Little has been seen of Ned in mainstage plays since. Matthew Ryan's Kelly breaks the drought.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Bayesian methodologies for solving optimal experimental design problems has increased. Many of these methods have been found to be computationally intensive for design problems that require a large number of design points. A simulation-based approach that can be used to solve optimal design problems in which one is interested in finding a large number of (near) optimal design points for a small number of design variables is presented. The approach involves the use of lower dimensional parameterisations that consist of a few design variables, which generate multiple design points. Using this approach, one simply has to search over a few design variables, rather than searching over a large number of optimal design points, thus providing substantial computational savings. The methodologies are demonstrated on four applications, including the selection of sampling times for pharmacokinetic and heat transfer studies, and involve nonlinear models. Several Bayesian design criteria are also compared and contrasted, as well as several different lower dimensional parameterisation schemes for generating the many design points.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This review considers the artwork of Melbourne artist Marcel Cousins showed at Ryan Renshaw Gallery, Brisbane in April 2012. The review traces Cousins' doctoral study in Tokyo. It then assesses his paintings and installations that explore the transformation of generic objects in exhibition contexts, as well as the aesthetic dimensions of such processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the past decade the use of long-lasting insecticidal nets (LLINs), in combination with improved drug therapies, indoor residual spraying (IRS) and better health infrastructure, has helped reduce malaria in many African countries for the first time in a generation. However, insecticide resistance in the vector is an evolving threat to these gains. We review emerging and historical data on behavioural resistance in response to LLINs and IRS. Overall the current literature suggests behavioural and species changes may be emerging, but the data are sparse and, at times unconvincing. However, preliminary modelling has demonstrated that behavioural resistance could have significant impacts on the effectiveness of malaria control. We propose seven recommendations to improve understanding of resistance in malaria vectors. Determining the public health impact of physiological and behavioural insecticide resistance is an urgent priority if we are to maintain the significant gains made in reducing malaria morbidity and mortality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid increase in the deployment of CCTV systems has led to a greater demand for algorithms that are able to process incoming video feeds. These algorithms are designed to extract information of interest for human operators. During the past several years, there has been a large effort to detect abnormal activities through computer vision techniques. Typically, the problem is formulated as a novelty detection task where the system is trained on normal data and is required to detect events which do not fit the learned `normal' model. Many researchers have tried various sets of features to train different learning models to detect abnormal behaviour in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM) to model the normal activities of people. The outliers of the model with insufficient likelihood are identified as abnormal activities. Our Semi-2D HMM is designed to model both the temporal and spatial causalities of the crowd behaviour by assuming the current state of the Hidden Markov Model depends not only on the previous state in the temporal direction, but also on the previous states of the adjacent spatial locations. Two different HMMs are trained to model both the vertical and horizontal spatial causal information. Location features, flow features and optical flow textures are used as the features for the model. The proposed approach is evaluated using the publicly available UCSD datasets and we demonstrate improved performance compared to other state of the art methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The state of the practice in safety has advanced rapidly in recent years with the emergence of new tools and processes for improving selection of the most cost-effective safety countermeasures. However, many challenges prevent fair and objective comparisons of countermeasures applied across safety disciplines (e.g. engineering, emergency services, and behavioral measures). These countermeasures operate at different spatial scales, are funded often by different financial sources and agencies, and have associated costs and benefits that are difficult to estimate. This research proposes a methodology by which both behavioral and engineering safety investments are considered and compared in a specific local context. The methodology involves a multi-stage process that enables the analyst to select countermeasures that yield high benefits to costs, are targeted for a particular project, and that may involve costs and benefits that accrue over varying spatial and temporal scales. The methodology is illustrated using a case study from the Geary Boulevard Corridor in San Francisco, California. The case study illustrates that: 1) The methodology enables the identification and assessment of a wide range of safety investment types at the project level; 2) The nature of crash histories lend themselves to the selection of both behavioral and engineering investments, requiring cooperation across agencies; and 3) The results of the cost-benefit analysis are highly sensitive to cost and benefit assumptions, and thus listing and justification of all assumptions is required. It is recommended that a sensitivity analyses be conducted when there is large uncertainty surrounding cost and benefit assumptions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Confirmatory factor analyses evaluated the factorial validity of the Observer Alexithymia Scale (OAS) in an alcohol-dependent sample. Observation was conducted by clinical psychologists. All models examined were rejected, given their poor fit. Given the psychometric limitations of the OAS shown in this study, the OAS may not be the most appropriate measure to use early in treatment among alcohol-dependent individuals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A comparison was made of accelerated professional development (APD) for nurses (n=64), involving peer consultation and reflective practice, and peer consultation alone (n=30). Although APD participants had a higher completion rate, improvements in caregiver behaviors and work environment were not significantly different.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article focuses on the evaluation of thesis supervision and highlights the vast range of problem areas presently documented as significant areas of concern for both graduate students and their supervisors. Additionally, the authors report on a study completed in 1995, which surveyed all Australian universities about current evaluative practices in postgraduate supervision. The conclusion of this study was that the conduct of such evaluations appears to be minimal and is primarily designed to obtain an indicator of the general “health” of a university's postgraduate supervision rather than to foster improved supervisory practices. As part of the same study, the authors conducted University faculty-based student and supervisor focus groups. Key issues emerging from these focus groups were: (1) the importance of relational aspects of supervision as the student communicates over the long term with one or more supervisors; (2) the importance of systematic feedback, monitoring, and evaluation to the supervisory process; and (3) the lack of strategies to facilitate this evaluative feedback process. On the basis of these findings, the authors designed evaluative strategies to facilitate regular ongoing feedback between students and supervisors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.