943 resultados para Branch and bounds
Resumo:
"…one should try to locate power at the extreme points of its exercise, where it is always less legal in character." (Foucault, 1980, p.97) Studies of schooling practices as techniques deriving from a particular art of governing that Foucault (2003b) called ‘governmentality’ have shown how psychopathologising discourses work to construct particular student-subjects and legitimise various practices of exclusion (Gram, 2007b). Here I extend this work to consider the use of alternative-site placement as an intensification in response to governmentality being put ‘at risk’. Governing ‘at a distance’ conjures an illusion of individual freedom which relies on the production of subjects who ‘choose’ to make choices that are consistent with the aspirations of government. In this chapter, it is argued that the designation of a child as ‘disorderly’ legitimises the intrusion of state into the private domain of the family via the Trojan horse of early intervention. This is enabled by the psy-sciences, whose technologies and aims amount to the moral retraining of ‘improper’ future-citizens who, in choosing to choose otherwise, threaten to make visible invisible relations of power. Alternative-site placement in special schools running intensive behaviour modification programs allows for a ‘redoubled insistence’ (Ewald, 1992) of these norms and limits that a ‘disorderly’ child threatens to transgress.
Resumo:
As Editor of Economic Analysis and Policy (EAP) I am delighted to announce that EAP is now published by Elsevier. EAP is the journal of the Economic Society of Australia (Queensland branch). As a result of this move, four issues of EAP will be published per year instead of the current three. This will include special issues. EAP will now receive wider coverage in the relevant abstracting and indexing services...
Resumo:
Selection of features that will permit accurate pattern classification is a difficult task. However, if a particular data set is represented by discrete valued features, it becomes possible to determine empirically the contribution that each feature makes to the discrimination between classes. This paper extends the discrimination bound method so that both the maximum and average discrimination expected on unseen test data can be estimated. These estimation techniques are the basis of a backwards elimination algorithm that can be use to rank features in order of their discriminative power. Two problems are used to demonstrate this feature selection process: classification of the Mushroom Database, and a real-world, pregnancy related medical risk prediction task - assessment of risk of perinatal death.
Resumo:
Summary form only given. Geometric simplicity, efficiency and polarization purity make slot antenna arrays ideal solutions for many radar, communications and navigation applications, especially when high power, light weight and limited scan volume are priorities. Resonant arrays of longitudinal slots have a slot spacing of one-half guide wavelength at the design frequency, so that the slots are located at the standing wave peaks. Planar arrays are implemented using a number of rectangular waveguides (branch line guides), arranged side-by-side, while waveguides main lines located behind and at right angles to the branch lines excite the radiating waveguides via centered-inclined coupling slots. Planar slotted waveguide arrays radiate broadside beams and all radiators are designed to be in phase.
Resumo:
There growing recognition that a contributor to the repeat crises of child sexual abuse (CSA) by personnel in Christian institutions (PICIs), is the often gendered culture of Christian institutions themselves. This work explores theological discursive constructions of masculinity and sexuality and their implications for addressing CSA by PICIs. The perspectives discussed here are of PICIs who participated in a research project conducted in Australia. From these perspectives male gendered and sexual performance is constructed through discourse as both an explanation and solution to offending behaviour. Similarly, sexuality is viewed as God-given, heteronormative and legitimately expressed only within the bounds of marriage. This work draws on Foucault and feminist discourses as they relate to CSA by PICIs and institutional discourses. This work offers a perspective of PICIs that may not otherwise be heard in the common discourses of CSA in Christian Institutions.
Resumo:
In this chapter, we draw on our experiences facilitating community storytelling workshops in regional Queensland in partnership with the Queensland branch of Oral History Association of Australia (OHAA Qld) in order to develop a best practice model for promoting creative approaches to recording oral narratives using digital tools, informed by creative writing practice and embedded evaluation (Klaebe 2012 & 2013). These experiences offer an insight into how creative approaches to training can facilitate the sharing and preservation of stories in regional communities.
Resumo:
We aim to design strategies for sequential decision making that adjust to the difficulty of the learning problem. We study this question both in the setting of prediction with expert advice, and for more general combinatorial decision tasks. We are not satisfied with just guaranteeing minimax regret rates, but we want our algorithms to perform significantly better on easy data. Two popular ways to formalize such adaptivity are second-order regret bounds and quantile bounds. The underlying notions of 'easy data', which may be paraphrased as "the learning problem has small variance" and "multiple decisions are useful", are synergetic. But even though there are sophisticated algorithms that exploit one of the two, no existing algorithm is able to adapt to both. In this paper we outline a new method for obtaining such adaptive algorithms, based on a potential function that aggregates a range of learning rates (which are essential tuning parameters). By choosing the right prior we construct efficient algorithms and show that they reap both benefits by proving the first bounds that are both second-order and incorporate quantiles.
Resumo:
Over 800 cities globally now offer bikeshare programs. One of their purported benefits is increased physical activity. Implicit in this claim is that bikeshare replaces sedentary modes of transport, particularly car use. This paper estimates the median changes in physical activity levels as a result of bikeshare in the cities of Melbourne, Brisbane, Washington, D.C., London, and Minneapolis/St. Paul. This study is the first known multi-city evaluation of the active travel impacts of bikeshare programs. To perform the analysis, data on mode substitution (i.e. the modes that bikeshare replaces) were used to determine the extent of shift from sedentary to active transport modes (e.g. when a car trip is replaced by bikeshare). Potentially offsetting these gains, reductions in physical activity when walking trips are replaced by bikeshare was also estimated. Finally a Markov Chain Monte Carlo analysis was conducted to estimate confidence bounds on estimated impacts on active travel given uncertainties in data sources. The results indicate that on average 60% of bikeshare trips replace sedentary modes of transport (from 42% in Minneapolis/St. Paul to 67% in Brisbane). When bikeshare replaces a walking trip, there is a reduction in active travel time because walking a given distance takes longer than cycling. Considering the active travel balance sheet for the cities included in this analysis, bikeshare activity in 2012 has an overall positive impact on active travel time. This impact ranges from an additional 1.4 million minutes of active travel for the Minneapolis/St. Paul bikeshare program, to just over 74 million minutes of active travel for the London program The analytical approach adopted to estimate bikeshare’s impact on active travel may act as the basis for future bikeshare evaluations or feasibility studies.
Resumo:
In the Yersinia pseudotuberculosis serotyping scheme, 21 serotypes are present originating from about 30 different O-factors distributed within the species. With regard to the chemical structures of lipopolysaccharides (LPSs) and the genetic basis of their biosynthesis, a number, but not all, of Y. pseudotuberculosis strains representing different serotypes have been investigated. In order to present an overall picture of the relationship between genetics and structures, we have been working on the genetics and structures of various Y. pseudotuberculosis O-specific polysaccharides (OPSs). Here, we present a structural and genetic analysis of the Y. pseudotuberculosis serotype O:11 OPS. Our results showed that this OPS structure has the same backbone as that of Y. pseudotuberculosis O:1b, but with a 6d-l-Altf side-branch instead of Parf. The 3′ end of the gene cluster is the same as that for O:1b and has the genes for synthesis of the backbone and for processing the completed repeat unit. The 5′ end has genes for synthesis of 6d-l-Altf and its transfer to the repeating unit backbone. The pathway for the synthesis of the 6d-l-Altf appears to be different from that for 6d-l-Altp in Y. enterocolitica O:3. The chemical structure of the O:11 repeating unit is [Figure]
Resumo:
The O-specific polysaccharide (OPS) is a variable constituent of the lipopolysaccharide of Gram-negative bacteria. The polymorphic nature of OPSs within a species is usually first defined serologically, and the current serotyping scheme for Yersinia pseudotuberculosis consists of 21 O serotypes of which 15 have been characterized genetically and structurally. Here, we present the structure and DNA sequence of Y. pseudotuberculosis O:10 OPS. The O unit consists of one residue each of d-galactopyranose, N-acetyl-d-galactosamine (2-amino-2-deoxy-d-galactopyranose) and d-glucopyranose in the backbone, with two colitose (3,6-dideoxy-l-xylo-hexopyranose) side-branch residues. This structure is very similar to that shared by Escherichia coli O111 and Salmonella enterica O35. The gene cluster sequences of these serotypes, however, have only low levels of similarity to that of Y. pseudotuberculosis O:10, although there is significant conservation of gene order. Within Y. pseudotuberculosis, the O10 structure is most closely related to the O:6 and O:7 structures.
Resumo:
Many, but not all, of the current 21 serotypes of Yersinia pseudotuberculosis have been investigated with regard to the chemical structures of their O-specific polysaccharide (OPS) and the genetic basis of their biosynthesis. Completion of the genetics and structures of the remaining serotypes will enhance our understanding of the emerging relationship between genetics and structures within this species. Here, we present a structural and genetic analysis of the Y. pseudotuberculosis serotype O:1c OPS. Our results showed that this OPS has the same backbone as Y. pseudotuberculosis O:2b, but with a 3,6-dideoxy-D-ribo-hexofuranose (paratofuranose, Parf) side-branch instead of a 3,6-dideoxy-D-xylo-hexopyranose (abequopyranose, Abep). The 3'-end of the gene cluster is the same as for O:2b and has the genes for synthesis of the backbone and for processing the completed repeat unit. The 5'-end of the cluster consists of the same genes as O:1b for synthesis of Parf and a related gene for its transfer to the repeating unit backbone.
Resumo:
In response to the Travelsafe Committee Report No. 51 – report on the inquiry into Automatic Plate Recognition Technology – it was recommended that the Queensland Police Service continue to trial the deployment of ANPR technology for traffic enforcement work and to evaluate the road safety impacts and operational effectiveness of the technology. As such, the purpose of this report is to provide an independent evaluation of a trial of ANPR that was conducted by a project team within the State Traffic Support Branch of the Queensland Police Service (QPS) and provide recommendations as to the applicability and usability of the technology for use throughout Queensland...
Resumo:
PCYCs, individually and as a whole, are highly valued in communities across Queensland. Participants in this evaluation identified numerous benefits of PCYCs, including: providing structured low-cost activities for young people and other community groups; developing positive relationships and trust between young people and police; developing young people into effective citizens; providing a safe place for young people and a hub for whole communities; addressing disadvantages faced by young people; and fostering social inclusion. Depending on the particular activities and programs delivered by a branch, PCYCs have the capacity to minimise risk factors and enhance protective factors relating to young people’s involvement in crime. For example, PCYCs can play an important role in strengthening young people’s engagement with education and family. However, the crime prevention and community safety aims of PCYCs, and measures that might work towards these aims are not widely- or well-understood, or appreciated, by those working in and with PCYCs. The key recommendation of this evaluation is therefore that the crime prevention and community safety aims of PCYCs in Queensland need to be better articulated, understood and reflected in the practice of those working in and with PCYCs. A related key finding is that many of the activities and programs currently provided by PCYCs could be better oriented towards the goals of crime prevention and community safety without major resource implications.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.