947 resultados para Internet environment
Resumo:
The regulatory enforcement literature proposes a continuum with two principal perspectives to gaining compliance with regulations at its extremes – a compliance approach and a deterrence approach. Within these perspectives a range of strategies and tools are used to support the broad intent of an enforcement agency. One tool is the inspection blitz, concentrating resources where significant non-compliance is suspected. While agencies enforcing minimum labour standards in the Australian federal jurisdiction have traditionally used the blitz strategy as an occasional tool, it is now more regularly used. This paper examines the blitz as an enforcement tool, placing it within the compliance/deterrence perspectives, before exploring its use by the Workplace Ombudsman/Fair Work Ombudsman. We argue that multiple factors have led to the blitz’s redesign in the post-Work Choices environment, and that its current framework and persuasive compliance nature is not appropriate for all situations.
Resumo:
Ways in which humans engage with the environment have always provided a rich source of material for writers and illustrators of Australian children's literature. Currently, readers are confronted with a multiplicity of complex, competing and/or complementing networks of ideas, theories and emotions that provide narratives about human engagement with the environment at a particular historical moment. This study, entitled Reading the Environment: Narrative Constructions of Ecological Subjectivities in Australian Children's Literature, examines how a representative sample of Australian texts (19 picture books and 4 novels for children and young adults published between 1995 and 2006) constructs fictional ecological subjects in the texts, and offers readers ecological subject positions inscribed with contemporary environmental ideologies. The conceptual framework developed in this study identifies three ideologically grounded positions that humans may assume when engaging with the environment. None of these positions clearly exists independently of any other, nor are they internally homogeneous. Nevertheless they can be categorised as: (i) human dominion over the environment with little regard for environmental degradation (unrestrained anthropocentrism); (ii) human consideration for the environment driven by understandings that humans need the environment to survive (restrained anthropocentrism); and (iii) human deference towards the environment guided by understandings that humans are no more important than the environment (ecocentrism). iv The transdisciplinary methodological approach to textual analysis used in this thesis draws on ecocriticism, narrative theories, visual semiotics, ecofeminism and postcolonialism to discuss the difficulties and contradictions in the construction of the positions offered. Each chapter of textual analysis focuses on the construction of subjectivities in relation to one of the positions identified in the conceptual framework. Chapter 5 is concerned with how texts highlight the negative consequences of human dominion over the environment, or, in the words of this study, living with ecocatastrophe. Chapter 6 examines representations of restrained anthropocentrism in its contemporary form, that is, sustainability. Chapter 7 examines representations of ecocentrism, a radical position with inherent difficulties of representation. According to the analysis undertaken, the focus texts convey the subtleties and complexities of human engagement with the environment and advocate ways of viewing and responding to contemporary unease about the environment. The study concludes that these ways of viewing and responding conform to and/or challenge dominant socio-cultural and political-economic opinions regarding the environment. This study, the first extended work of its kind, makes an original contribution to ecocritical study of Australian children's literature. By undertaking a comprehensive analysis of how texts for children represent human engagement with the environment at a time when important environmental concerns pose significant threats to human existence, I hope to contribute new knowledge to an area of children's literature research that to date has been significantly under-represented.
Resumo:
The following exegesis will detail the key advantages and disadvantages of combining a traditional talk show genre with a linear documentary format using a small production team and a limited budget in a fast turnaround weekly environment. It will deal with the Australian Broadcasting Corporation series Talking Heads, broadcast weekly in the early evening schedule for the network at 18.30 with the presenter Peter Thompson. As Executive Producer for the programme at its inception I was responsible for setting it up for the ABC in Brisbane, a role that included selecting most of the team to work on the series and commissioning the music, titles and all other aspects required to bring the show to the screen. What emerged when producing this generic hybrid will be examined at length, including: „h The talk show/documentary hybrid format needs longer than 26¡¦30¡¨ to be entirely successful. „h The type of presenter ideally suited to the talk show/documentary format requires someone who is genuinely interested in their guests and flexible enough to maintain the format against tangential odds. „h The use of illustrative footage shot in a documentary style narrative improves the talk show format. iv „h The fast turnaround of the talk show/documentary hybrid puts tremendous pressure on the time frames for archive research and copyright clearance and therefore needs to be well-resourced. „h In a fast turnaround talk show/documentary format the field components are advantageous but require very low shooting ratios to be sustainable. „h An intimate set works best for a talk show hybrid like this. Also submitted are two DVDs of recordings of programmes I produced and directed from the first and third series. These are for consideration in the practical component of this project and reflect the changes that I made to the series.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
The internet infrastructure which supports high data rates has a major impact on the Australian economy and the world. However, in rural Australia, the provision of broadband services to an internet dispersed population over a large geographical area with low population densities remains both an economic and technical challenge [1]. Furthermore, the implementation of currently available technologies such as fibre-to-the-premise (FTTP), 3G, 4G and WiMAX seems to be impractical, considering the low population density that is distributed in a large area. Therefore, new paradigms and innovative telecommunication technologies need to be explored to overcome the challenges of providing faster and more reliable broadband internet services to internet dispersed rural areas. The research project implements an innovative Multi-User- Single-Antenna for MIMO (MUSA-MIMO) technology using the spectrum currently allocated to analogue TV. MUSAMIMO technology can be considered as a special case of MIMO technology, which is beneficial when provisioning reliable and high-speed communication channels. Particularly, the abstract describes the development of a novel MUSA-MIMO channel model that takes into account temporal variations in the rural wireless environment. This can be considered as a novel approach tailor-made to rural Australia for provisioning efficient wireless broadband communications.
Resumo:
High-speed broadband internet access is widely recognised as a catalyst to social and economic development, having a significant impact on global economy. Rural Australia’s inherent dispersed population over a large geographical area make the delivery of efficient, well-maintained and cost-effective internet a challenging task. The novel and highly-efficient Multi-User-Single-Antenna for MIMO (MUSA-MIMO) broadband wireless communication technology can effectively be used to deliver wireless broadband access to rural areas. This research aims to develop for the first time, an efficient and accurate algorithm for the tracking and prediction of Channel State Information (CSI) at the transmitter, by characterising time variation effects of the wireless communication channel on the performance of a highly-efficient MUSA-MIMO technology particularly suited for rural communities, improving their quality of life and economic prosperity.
Resumo:
Business Process Modelling is a fast growing field in business and information technology, which uses visual grammars to model and execute the processes within an organisation. However, many analysts present such models in a 2D static and iconic manner that is difficult to understand by many stakeholders. Difficulties in understanding such grammars can impede the improvement of processes within an enterprise due to communication problems. In this chapter we present a novel framework for intuitively visualising animated business process models in interactive Virtual Environments. We also show that virtual environment visualisations can be performed with present 2D business process modelling technology, thus providing a low barrier to entry for business process practitioners. Two case studies are presented from film production and healthcare domains that illustrate the ease with which these visualisations can be created. This approach can be generalised to other executable workflow systems, for any application domain being modelled.
Resumo:
This paper discusses how internet services can be brought one step closer to the rural dispersed communities by improving wireless broadband communications in those areas. To accomplish this objective we describe the use of an innovative Multi-User-Single-Antenna for MIMO (MUSA-MIMO) technology using the spectrum currently allocated to analogue TV. MUSA-MIMO technology can be considered as a special case of MIMO technology, which is beneficial when provisioning reliable and high-speed communication channels. This paper describes channel modelling techniques to characterise the MUSA-MIMO system allowing an effective deployment of this technology. Particularly, it describes the development of a novel MUSA MIMO channel model that takes into account temporal variations in the rural wireless environment. This can be considered as a novel approach tailor-maid to rural Australia for provisioning efficient wireless broadband communications.
Resumo:
Information fusion in biometrics has received considerable attention. The architecture proposed here is based on the sequential integration of multi-instance and multi-sample fusion schemes. This method is analytically shown to improve the performance and allow a controlled trade-off between false alarms and false rejects when the classifier decisions are statistically independent. Equations developed for detection error rates are experimentally evaluated by considering the proposed architecture for text dependent speaker verification using HMM based digit dependent speaker models. The tuning of parameters, n classifiers and m attempts/samples, is investigated and the resultant detection error trade-off performance is evaluated on individual digits. Results show that performance improvement can be achieved even for weaker classifiers (FRR-19.6%, FAR-16.7%). The architectures investigated apply to speaker verification from spoken digit strings such as credit card numbers in telephone or VOIP or internet based applications.
Resumo:
Natural disasters and deliberate, willful damage to telecommunication infrastructure can result in a loss of critical voice and data services. This loss of service hinders the ability for efficient emergency response and can cause delays leading to loss of life. Current mobile devices are generally tied to one network operator. When a disaster is of significant impact, that network operator cannot be relied upon to provide service and coverage levels that would normally exist. While some operators have agreements with other operators to share resources (such as network roaming) these agreements are contractual in nature and cannot be activated quickly in an emergency. This paper introduces Fourth Generation (4G) wireless networks. 4G networks are highly mobile and heterogeneous, which makes 4G networks highly resilient in times of disaster.
Resumo:
Abstract: This paper details an in-vitro study using human adipose tissue-derived precursor/stem cells (ADSCs) in three-dimensional (3D) tissue culture systems. ADSCs from 3 donors were seeded onto NaOH-treated medical grade polycaprolactone-tricalcium phosphate (mPCL-TCP) scaffolds with two different matrix components; fibrin glue and lyophilized collagen. ADSCs within these scaffolds were then induced to differentiate along the osteogenic lineage for a 28-day period and various assays and imaging techniques were performed at Day 1, 7, 14, 21 and 28 to assess and compare the ADSC’s adhesion, viability, proliferation, metabolism and differentiation along the osteogenic lineage when cultured in the different scaffold/matrix systems. The ADSC cells were proliferative in both collagen and fibrin mPCL-TCP scaffold systems with a consistently higher cell number (by comparing DNA amounts) in the induced group over the non-induced groups for both scaffold systems. In response to osteogenic induction, these ADSCs expressed elevated osteocalcin, alkaline phosphatase and osteonectin levels. Cells were able to proliferate within the pores of the scaffolds and form dense cellular networks after 28 days of culture and induction. The successful cultivation of osteogenic by FDM process manufactured ADSCs within a 3D matrix comprising fibrin glue or collagen, immobilized within a robust synthetic scaffold is a promising technique which should enhance their potential usage in the regenerative medicine arena, such as bone tissue engineering.
Resumo:
We investigate whether characteristics of the home country capital environment, such as information disclosure and investor rights protection continue to affect ADRs cross-listed in the U.S. Using microstructure measures as proxies for adverse selection, we find that characteristics of the home markets continue to be relevant, especially for emerging market firms. Less transparent disclosure, poorer protection of investor rights and weaker legal institutions are associated with higher levels of information asymmetry. Developed market firms appear to be affected by whether or not home business laws are common law or civil law legal origin. Our finding contributes to the bonding literature. It suggests that cross-listing in the U.S. should not be viewed as a substitute for improvement in the quality of local institutions, and attention must be paid to improve investor protection in order to achieve the full benefits of improved disclosure. Improvement in the domestic capital market environment can attract more investors even for U.S. cross-listed firms.
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
The technological environment in which Australian SMEs operate can be best described as dynamic and vital. The rate of technological change provides the SME owner/manager a complex and challenging operational context. Wireless applications are being developed that provide mobile devices with Internet content and e-business services. In Australia the adoption of e-commerce by large organisations has been relatively high, however the same cannot be said for SMEs where adoption has been slower than other developed countries. In contrast however mobile telephone adoption and diffusion is relatively high by SMEs. This exploratory study identifies attitudes, perceptions and issues for mobile data technologies by regional SME owner/managers across a range of industry sectors. The major issues include the sector the firm belongs to, the current adoption status of the firm, the level of mistrust of the IT industry, the cost of the technologies and the applications and attributes of the technologies.