922 resultados para Local Group


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development planning process introduced under Law No. 25/2004 is said to be a better approach to increase public participation in decentralised Indonesia. This Law has introduced planning mechanisms, called Musyawarah Perencanaan Pembangunan (musrenbang), to provide a forum for development planning. In spite of the expressed intention of these mechanisms to improve public participation, some empirical observations have cast doubt on the outcomes. As a result, some local governments have tried to provide alternative mechanisms for participatory local development planning processes. Since planning constitutes one of the most effective ways to improve community empowerment, this paper aims to examine the extent to which the alternative local development planning process in Indonesia provides sufficient opportunities to improve the self organising capabilities of communities to sustain development programs to meet local needs. In so doing, this paper explores the key elements and approaches of the concept of community empowerment and shows how they can be incorporated within planning processes. Based on this, it then examines the problems encountered by musrenbang in increasing community empowerment. Having done this, it is argued that to change current unfavourable outcomes, procedural justice and social learning approaches need to be incorporated as pathways to community empowerment. Lastly the capacity of an alternative local planning process, called Sistem Dukungan (SISDUK), introduced in South Sulawesi, offering scope to incorporate procedural justice and social learning is explored as a means to improve the self organizing capabilities of local communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Injuries and deaths due to unsafe driving practices are a substantial health and socioeconomic burden to the community. Young socially disadvantaged males who are involved in a lifestyle of risky behaviour, crime and motor vehicle accidents seem unaffected by educational campaigns to improve safer driving. The aim is to develop a driving and social behavioural profile that may explain the lack of effectiveness of road safety advertising and suggest ways to refine educational strategies to reduce the risky lifestyle and associated harms among those most vulnerable, the 15-25 year olds. The procedure involved a quantitative and qualitative analysis through questionnaires, surveys and focus groups involving a comparison of populations (n = 668) by age, gender and socioeconomic status in three discrete Australian sites. Information gathered included issues related to road safety awareness, knowledge of advertising, personal and peer group attitudes as well as driving and life style history. The results indicate that within the community a highly visible profile of strong anti-social road safety activities by an educationally and economically disadvantaged sub-culture exists and this group seem impervious to road safety advertising and education initiatives. As the overall unsafe driving and risky antisocial behaviour is significant among 15-25 year olds within the community the solution is seen to be community based. A long-term (five to ten year) program has been posited; promoting community partnerships through consultative and local action committees at all levels creating locally designed formal and informal educational and mutual support programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crime: Local and Global covers the way local events (such as prostitution) have wider aspects than previously thought. Links with people traffickers, international organised crime and violence cannot be ignored any longer. Each crime or area of activity selected within this text has a global reach, and is made ever more possible due to the way globalisation has opened up markets, both legitimate and illegitimate. The book's approach and scope emphasises that we can no longer view 'crime' as something which occurs within certain jurisdictions, at certain times and in particular places. For example, the chapter on cybercrime highlights the 'illegal' acts that can be perpetrated by second lifers, anywhere in the world, but are they a crime?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The QUT Design Lecture Series 2010 was a partnered event between QUT School of Design and the State Library of Queensland. The series, spanning from July to September 2010, involved 10 lectures delivered by international, national and local academics, researchers and practitioners. The QUT Design Lecture series 2010 was a public event which examined the cross over between design, digital technologies and artistic practices focusing upon research themes of intangible media, experimental eco-technologies and artistic-design production. Gold Medal Australian Institute of Architects, Clare Design opened the series, whilst internationally awarded and recognised Spanish design group Cloud 9 concluded the series, both focusing on new eco-technologies in the development of contemporary architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our research explores the design of networked technologies to facilitate local suburban communications and to encourage people to engage with their local community. While there are many investigations of interaction designs for networked technologies, most research utilises small exercises, workshops or other short-term studies to investigate interaction designs. However, we have found these short-term methods to be ineffective in the context of understanding local community interaction. Moreover we find that people are resistant to putting their time into workshops and exercises, understandably so because these are academic practices, not local community practices. Our contribution is to detail a long term embedded design approach in which we interact with the community over the long term in the course of normal community goings-on with an evolving exploratory prototype. This paper discusses the embedded approach to working in the wild for extended field research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2005 the Shanghai municipal government adopted the notion of ‘creative industries’ as part of their economic development strategy. At the same time, they officially recognized a number of ‘Creative Industry Clusters’ (CIC) in the city; over the next five years these official clusters grew to over ninety in number. The active promotion of CIC by the local state can thus been seen as central to its adoption of the creative industries agenda, in turn part of its aspiration to become a modern, global metropolis. In the first part of this paper we look at the emergence of the creative industry agenda in China, making some general observations about the need to place such policy transfer in its specific context. We suggest how this agenda might be understood in the national context of China’s economic and cultural policy development. In the second we give a critical account of the development of the creative industries agenda in Shanghai and its relationship to that for CIC. We argue that this agenda had more to do with real estate development than the promotion of a ‘creative milieu’ or ‘ecosystem’, and we also give some reasons as to why this was the case. In the third section we provide some new evidence to suggest the increasing disjunction between CIC and such a wider ‘creative milieu’. In the final section we suggest some new ways in which these CIC might be approached by local government in Shanghai .

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Magnetohydrodynamic (MHD) natural convection laminar flow from an iso-thermal horizontal circular cylinder immersed in a fluid with viscosity proportional to a linear function of temperature will be discussed with numerical simulations. The governing boundary layer equations are transformed into a non-dimensional form and the resulting nonlinear system of partial differential equa-tions are reduced to convenient form, which are solved numerically by two very efficient methods, namely, (i) Implicit finite difference method together with Keller box scheme and (ii) Direct numerical scheme. Numerical results are presented by velocity and temperature distributions of the fluid as well as heat transfer characteristics, namely the shearing stress and the local heat transfer rate in terms of the local skin-friction coefficient and the local Nusselt number for a wide range of magnetohydrodynamic parameter, viscosity-variation parameter and viscous dissipation parameter. MHD flow in this geometry with temperature dependent viscosity is absent in the literature. The results obtained from the numerical simulations have been veri-fied by two methodologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an iterative hierarchical algorithm for multi-view stereo. The algorithm attempts to utilise as much contextual information as is available to compute highly accurate and robust depth maps. There are three novel aspects to the approach: 1) firstly we incrementally improve the depth fidelity as the algorithm progresses through the image pyramid; 2) secondly we show how to incorporate visual hull information (when available) to constrain depth searches; and 3) we show how to simultaneously enforce the consistency of the depth-map by continual comparison with neighbouring depth-maps. We show that this approach produces highly accurate depth-maps and, since it is essentially a local method, is both extremely fast and simple to implement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous research has shown resistance to extinction of fear conditioned to racial out-group faces, suggesting that these stimuli may be subject to prepared fear learning. The current study replicated and extended previous research by using a different racial out-group, and testing the prediction that prepared fear learning is unaffected by verbal instructions. Four groups of Caucasian participants were trained with male in-group (Caucasian) or out-group (Chinese) faces as conditional stimuli; one paired with an electro-tactile shock (CS+) and one presented alone (CS). Before extinction, half the participants were instructed that no more shocks would be presented. Fear conditioning, indexed by larger electrodermal responses to, and blink startle modulation during the CS+, occurred during acquisition in all groups. Resistance to extinction of fear learning was found only in the racial out-group, no instruction condition. Fear conditioned to a racial out-group face was reduced following verbal instructions, contrary to predictions for the nature of prepared fear learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the geometric description of the group law and applies to hyperelliptic curves of arbitrary genus. While Cantor’s general composition involves arithmetic in the polynomial ring F_q[x], the algorithm we propose solves a linear system over the base field which can be written down directly from the Mumford coordinates of the group elements. We apply this method to give more efficient formulas for group operations in both affine and projective coordinates for cryptographic systems based on Jacobians of genus 2 hyperelliptic curves in general form.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anthropometry has long been used for a range of ergonomic applications & product design. Although products are often designed for specific cohorts, anthropometric data are typically sourced from large scale surveys representative of the general population. Additionally, few data are available for emerging markets like China and India. This study measured 80 Chinese males that were representative of a specific cohort targeted for the design of a new product. Thirteen anthropometric measurements were recorded and compared to two large databases that represented a general population, a Chinese database and a Western database. Substantial differences were identified between the Chinese males measured in this study and both databases. The subjects were substantially taller, heavier and broader than subjects in the older Chinese database. However, they were still substantially smaller, lighter and thinner than Western males. Data from current Western anthropometric surveys are unlikely to accurately represent the target population for product designers and manufacturers in emerging markets like China.