951 resultados para Homiletical illustrations.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many large coal mining operations in Australia rely heavily on the rail network to transport coal from mines to coal terminals at ports for shipment. Over the last few years, due to the fast growing demand, the coal rail network is becoming one of the worst industrial bottlenecks in Australia. As a result, this provides great incentives for pursuing better optimisation and control strategies for the operation of the whole rail transportation system under network and terminal capacity constraints. This PhD research aims to achieve a significant efficiency improvement in a coal rail network on the basis of the development of standard modelling approaches and generic solution techniques. Generally, the train scheduling problem can be modelled as a Blocking Parallel- Machine Job-Shop Scheduling (BPMJSS) problem. In a BPMJSS model for train scheduling, trains and sections respectively are synonymous with jobs and machines and an operation is regarded as the movement/traversal of a train across a section. To begin, an improved shifting bottleneck procedure algorithm combined with metaheuristics has been developed to efficiently solve the Parallel-Machine Job- Shop Scheduling (PMJSS) problems without the blocking conditions. Due to the lack of buffer space, the real-life train scheduling should consider blocking or hold-while-wait constraints, which means that a track section cannot release and must hold a train until the next section on the routing becomes available. As a consequence, the problem has been considered as BPMJSS with the blocking conditions. To develop efficient solution techniques for BPMJSS, extensive studies on the nonclassical scheduling problems regarding the various buffer conditions (i.e. blocking, no-wait, limited-buffer, unlimited-buffer and combined-buffer) have been done. In this procedure, an alternative graph as an extension of the classical disjunctive graph is developed and specially designed for the non-classical scheduling problems such as the blocking flow-shop scheduling (BFSS), no-wait flow-shop scheduling (NWFSS), and blocking job-shop scheduling (BJSS) problems. By exploring the blocking characteristics based on the alternative graph, a new algorithm called the topological-sequence algorithm is developed for solving the non-classical scheduling problems. To indicate the preeminence of the proposed algorithm, we compare it with two known algorithms (i.e. Recursive Procedure and Directed Graph) in the literature. Moreover, we define a new type of non-classical scheduling problem, called combined-buffer flow-shop scheduling (CBFSS), which covers four extreme cases: the classical FSS (FSS) with infinite buffer, the blocking FSS (BFSS) with no buffer, the no-wait FSS (NWFSS) and the limited-buffer FSS (LBFSS). After exploring the structural properties of CBFSS, we propose an innovative constructive algorithm named the LK algorithm to construct the feasible CBFSS schedule. Detailed numerical illustrations for the various cases are presented and analysed. By adjusting only the attributes in the data input, the proposed LK algorithm is generic and enables the construction of the feasible schedules for many types of non-classical scheduling problems with different buffer constraints. Inspired by the shifting bottleneck procedure algorithm for PMJSS and characteristic analysis based on the alternative graph for non-classical scheduling problems, a new constructive algorithm called the Feasibility Satisfaction Procedure (FSP) is proposed to obtain the feasible BPMJSS solution. A real-world train scheduling case is used for illustrating and comparing the PMJSS and BPMJSS models. Some real-life applications including considering the train length, upgrading the track sections, accelerating a tardy train and changing the bottleneck sections are discussed. Furthermore, the BPMJSS model is generalised to be a No-Wait Blocking Parallel- Machine Job-Shop Scheduling (NWBPMJSS) problem for scheduling the trains with priorities, in which prioritised trains such as express passenger trains are considered simultaneously with non-prioritised trains such as freight trains. In this case, no-wait conditions, which are more restrictive constraints than blocking constraints, arise when considering the prioritised trains that should traverse continuously without any interruption or any unplanned pauses because of the high cost of waiting during travel. In comparison, non-prioritised trains are allowed to enter the next section immediately if possible or to remain in a section until the next section on the routing becomes available. Based on the FSP algorithm, a more generic algorithm called the SE algorithm is developed to solve a class of train scheduling problems in terms of different conditions in train scheduling environments. To construct the feasible train schedule, the proposed SE algorithm consists of many individual modules including the feasibility-satisfaction procedure, time-determination procedure, tune-up procedure and conflict-resolve procedure algorithms. To find a good train schedule, a two-stage hybrid heuristic algorithm called the SE-BIH algorithm is developed by combining the constructive heuristic (i.e. the SE algorithm) and the local-search heuristic (i.e. the Best-Insertion- Heuristic algorithm). To optimise the train schedule, a three-stage algorithm called the SE-BIH-TS algorithm is developed by combining the tabu search (TS) metaheuristic with the SE-BIH algorithm. Finally, a case study is performed for a complex real-world coal rail network under network and terminal capacity constraints. The computational results validate that the proposed methodology would be very promising because it can be applied as a fundamental tool for modelling and solving many real-world scheduling problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road crashes cost world and Australian society a significant proportion of GDP, affecting productivity and causing significant suffering for communities and individuals. This paper presents a case study that generates data mining models that contribute to understanding of road crashes by allowing examination of the role of skid resistance (F60) and other road attributes in road crashes. Predictive data mining algorithms, primarily regression trees, were used to produce road segment crash count models from the road and traffic attributes of crash scenarios. The rules derived from the regression trees provide evidence of the significance of road attributes in contributing to crash, with a focus on the evaluation of skid resistance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In response to the need to leverage private finance and the lack of competition in some parts of the Australian public sector major infrastructure market, especially in very large economic infrastructure procured using Pubic Private Partnerships, the Australian Federal government has demonstrated its desire to attract new sources of in-bound foreign direct investment (FDI) into the Australian construction market. This paper aims to report on progress towards an investigation into the determinants of multinational contractors’ willingness to bid for Australian public sector major infrastructure projects and which is designed to give an improved understanding of matters surrounding FDI into the Australian construction sector. This research deploys Dunning’s eclectic theory for the first time in terms of in-bound FDI by multinational contractors and as head contractors bidding for Australian major infrastructure public sector projects. Elsewhere, the authors have developed Dunning’s principal hypothesis associated with his eclectic framework in order to suit the context of this research and to address a weakness arising in Dunning’s principal hypothesis that is based on a nominal approach to the factors in the eclectic framework and which fail to speak to the relative explanatory power of these factors. In this paper, an approach to reviewing and analysing secondary data, as part of the first stage investigation in this research, is developed and some illustrations given, vis-à-vis the selected sector (roads, bridges and tunnels) in Australia (as the host location) and using one of the selected home countries (Spain). In conclusion, some tentative thoughts are offered in anticipation of the completion of the first stage investigation - in terms of the extent to which this first stage based on secondary data only might suggest the relative importance of the factors in the eclectic framework. It is noted that more robust conclusions are expected following the future planned stages of the research and these stages including primary data are briefly outlined. Finally, and beyond theoretical contributions expected from the overall approach taken to developing and testing Dunning’s framework, other expected contributions concerning research method and practical implications are mentioned.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Medical industries have brought Information Technology (IT) in their systems for both patients and medical staffs due to the numerous benefits of IT we experience at presently. Moreover, the Mobile healthcare (M-health) system has been developed as the first step of Ubiquitous Health Environment (UHE). With the mobility and multi-functions, M-health system will be able to provide more efficient and various services for both doctors and patients. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well implemented. In this paper, user authentication and authorization procedures will applied as a featured component at each level of M-health systems inthe hospital environment. Accordingly, M-health system in the hospital will meet the optimal requirements as a countermeasure to its vulnerabilities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the recent past, there are some social issues when personal sensitive data in medical database were exposed. The personal sensitive data should be protected and access must be accounted for. Protecting the sensitive information is possible by encrypting such information. The challenge is querying the encrypted information when making the decision. Encrypted query is practically somewhat tedious task. So we present the more effective method using bucket index and bloom filter technology. We find that our proposed method shows low memory and fast efficiency comparatively. Simulation approaches on data encryption techniques to improve health care decision making processes are presented in this paper as a case scenario.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

U-Healthcare means that it provides healthcare services "at anytime and anywhere" using wired, wireless and ubiquitous sensor network technologies. As a main field of U-healthcare, Telehealth has been developed as an enhancement of Telemedicine. This system includes two-way interactive web-video communications, sensor technology, and health informatics. With these components, it will assist patients to receive their first initial diagnosis. Futhermore, Telehealth will help doctors diagnose patient's diseases at early stages and recommend treatments to patients. However, this system has a few limitations such as privacy issues, interruption of real-time service and a wrong ordering from remote diagnosis. To deal with those flaws, security procedures such as authorised access should be applied to as an indispensible component in medical environment. As a consequence, Telehealth system with these protection procedures in clinical services will cope with anticipated vulnerabilities of U-Healthcare services and security issues involved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an abundance of books available on the topic of motherhood and mothering; the majority of these books focus on the vulnerability of babies and young children and the motherwork such vulnerability demands. In particular they focus on what it is right to do in the interests of the child, and particularly his or her growth and development. Such a focus is consistent in Western culture with modern moral frameworks where understandings of goodness have been assimilated to dimensions of human action rather than dimensions of human being, selfhood, or specific forms of life. As Charles Taylor has observed, much modern moral philosophy has focused =on what it is right to do rather than the nature of the good life‘ (1989, 13). The master narratives of motherhood and the prevailing social discourses of intensive1 and sacrificial2 mothering exemplify this view as such narratives and discourses depict =what mothers are expected to do [and] how mothers are supposed to be‘ (Nelson 2001, 140). From such infant/child-focused accounts a canonical maternal identity can be discerned; arguably, it is a restricted one. The majority of these books fail to address questions related to what it means be a mother in particular situated, existing, living realities. For instance, ask a mother with young children what being a mother means to her and she may speak of the challenges she faces balancing paid employment and her role as a mother, or the impact of the demands being made on her time and energy. However, ask a mother with young adult-children3 what being a mother means to her and she may speak in similar tones, but she may also speak in differing tones. For example, a "mature" mother may speak of the "empty nest", the "crowded house" and/or "its revolving front door". She may speak of issues related to the vulnerability of the long term marriage, elder care, or grandparenting, or even disillusionment and disenchantment. The purpose of this research is to explore the identity challenges and prospects of some mothers with young adult-children aged between 18 and 30 years of age in twenty-first century Australia. In interpreting the identity challenges and prospects this particular cohort of mothers encounter in their ordinary, everyday living, a diverse and particular range of maternal experiences.my own included5.have been traced, along with the social and ethical meanings ascribed in them. With an understanding and appreciation of voice as the medium which connects one's inner and outer worlds, this research illuminates the plurality of voices and the multiple layers of meaning in each of these mother's particular living and existing realities. Specifically, this research addresses the narrowly constructed, canonical maternal identity through a critical exploration and reflection on stories, shared in a research context, of the living realities of a group of self-identified "mature", middle-class, Australian mothers with children aged between 18 and 30 years of age6. By appraising the broader familial, historical, social, cultural, institutional, and, importantly, moral contexts in which these mothers are situated, 'thick descriptions' (Geertz 1973, 27)7 of maternal identities, and the challenges and prospects these mothers are negotiating, are provided. In terms of its ethical orientation, the frameworks which support and frame this research reject, repudiate and contest (Nelson 2001) the reduction of ethical concerns to individual or intellectual problems or dilemmas to be solved through the application of a theory derived from reasoned thinking. In dismissing deductive and =theoretical-juridical‘8 approaches, the individualistic orientation entrenched in contemporary Western moral thinking, expressed in the notion of '"what ought I to do" when faced with a problem, issue or dilemma of practical urgency' (Isaacs & Massey 1994, 1), is simultaneously rejected, repudiated and contested (Nelson 2001). In countering such understandings, this research reorients us to the illumination and articulation of who it is good to be, for each of these mothers, in allegiance with those goods which guide and inspire her orientations towards living a good life—a life which embraces and enhances the flourishing of herself and her significant others. With an understanding and appreciation that 'mind is never free of precommitment[—t]here is no innocent eye, nor is there one that penetrates aboriginal reality' (Bruner 1987, 32), this thesis is written with the voices of other interlocutors9. These interlocutors include the voices of my research participants whom I refer to as "research interlocutors", my textual "friends" — those scholars whose work resonates strongly with my orientations—as well as the myriad other voices that speak to mothers, for mothers and about mothers, such as those found in popular and mainstream press and culture. Sometimes these voices resonate; other times dissonance may be heard. In situating this research within these complementary frameworks, this research invites readers to join with me in considering, appreciating and appraising the narrow construction of maternal identity. I seek for this engagement, like the engagements with my research interlocutors, to be 'a meeting of voices, an authentic dialogue that is inclusive of the voices of all concerned participants' (Isaacs 2001, 6). I hope that the voices in this thesis resonate with yours (although, at times, you may feel some dissonance) and that together we can draw closer to the accounting, re-counting and re-stor(y)ing of maternal identities; like concentric circles of witness, the dialogue, ...will thus be expanded rippling into corners where one might both imagine, and least expect. Possibilities, then, are vast; the future exciting (Smith 2007, 397). This research is also shaped and guided by maternal scholarship, a relatively new field of inquiry known as 'motherhood studies' (O'Reilly 2011, xvii) which has its origins within the broader terrain of feminist scholarship. As a work of maternal scholarship, this thesis draws upon and continues the tradition of examining motherhood as it is experienced 'in a social context, as embedded in a political institution: in feminist terms' (Rich 1995, ix). It values mothers, their experiences, their stories, their lives. As such, this research is oriented towards 'matricentric feminism', a particular form of feminist inquiry, politics and theory which is consistent with and receptive to feminist frameworks of care and equal rights (O‘Reilly 2011, 25). A number of complementary conceptual frameworks have been engaged in this research with the thesis presented in three parts: the pre-figurative, configurative and re-configurative. As my particular living experiences provided the initial motivation for this research, an account of the challenges I experienced as a mother with young adult-children are outlined as a Prelude to this thesis. Attention then turns to Part One – Pre-figuring Maternal Identities in which the contextual, conceptual and methodological foundations underpinning this research are explored and outlined. In Chapter One, the prevailing cultural narratives and social discourses supporting and shaping the construction of the canonical maternal identity are outlined. Next, in setting the scholarly context, the critiques — arising from feminist and maternal scholarship — of motherhood as a patriarchal institution, mothering as experience, and mothering as work, are explored. As this research engaged with participants who are embedded in particular middle-class, heterosexual, familial and cultural structures, an exploration of family life cycle theory and main stream media accounts are also incorporated. The terrain in which "mature" mothering within an Australian context is experienced is also outlined, including the notions of "empty nests" and "crowded houses", grandparenting, elder care and women's midlife transition. Chapter Two gives an account of the conceptual ontological, ethical, identity and narrative frameworks underpinning this research. In setting the context for rich interpretations, the characteristics of being human10 are outlined before attention turns to our embodiment and embeddedness in our shared human condition11. From this point, attention then turns to understanding the moral form of human living12. In appreciating the vulnerability inherent in our shared human condition, the ways in which we may experience trouble in our lives is noted. The framing of identity constitution13 as complex, multi-faceted, relationally negotiated and composed is then outlined, followed by an understanding of why narrative is a valuable interpretive tool for interpreting and understanding human experiences. This chapter concludes with an appreciation of the ethical significance of storytelling. The research methodology is then outlined in Chapter Three. The rationale underpinning the adoption of the narrative interviewing technique of in-depth interviewing is explored. In exploring these methodological frameworks, the recruitment and interview processes involved in gathering and interpreting the recorded transcripts of ten Australian mothers with young adult-children are outlined. The method of analysis known as the Listening Guide14 best complements the multi-layered, pluri-vocal nature of narrative accounting. The final section of Chapter Three outlines The Guide, with one mother's recorded transcript used to illustrate this method's step-by-step process. Having gathered an understanding and appreciation of the pluri-vocal, multi-layered nature of narrative and identity constitution, the tone of this thesis changes in Part Two . Configuring Maternal Identities. This section consists of Chapters Four and Five and seeks to find meaning in, and make sense of, the differences and commonalities across these particular accounts. Chapter Four explores the living realities of four Australian mothers with young adult-children: Poppy, Honey, Lily and Heather. In presenting a thick description of these mothers' situated realities, the frameworks.the familial, social, cultural, historical and institutional backgrounds.which have supported and shaped each mother's experiences are illuminated. Simultaneously revealed through these particular accounts are the plurality of goods focusing and moving each mother to the moral form of life, a life of meaning and purpose. The harms challenging some mothers' moral motivations are also revealed in this chapter. Specifically illustrated in Chapter Four are the unique and qualitative differences of particular maternal identity configurations. Chapter Five reveals the commonalities amongst all of the research interlocutors' accounts. This chapter contests the individualistic orientation of many contemporary accounts of motherhood which are aimed at defining or contesting what a "good" mother ought to do. By turning away from such individualistic orientations, the chapter does not seek to define 'the content of obligation' (Taylor 1989, 3) but rather seeks to illuminate and articulate a richer, deeper understanding and appreciation of maternal be-ing and be-coming - that is, who it is good to be, for each of these mothers - in allegiance with those goods that focus and inspire her moral motivations. Part Three - Re-Configuring Maternal Identities, which is comprised of Chapter Six, draws this thesis to a close. In this final chapter, the preconceptions, conditions and aspirations for this mother-centred account of the living realities of a small, local cohort of mothers are reiterated. The insights gathered from the rich, descriptive accounts are illuminated and articulated, and the chapter closes with some suggestions for future research. In a Postlude, I reflect on how this research has been a transformative learning experience in my own life.an experience in which I have been able to not only deeply understand and appreciate the challenges and disorientation I was experiencing but also to identify and reorient my stance in relation to the good. In a practical sense, by offering thick descriptions of the living realities of this cohort of "mature" mothers, this research challenges the canonical maternal identity and questions its relevance for, and effect on, "mature" mothers' identity constitution. By bringing to light the complex existing realities of these particular mothers, this research critiques the canonical maternal identity by illustrating that each mother's life and her identity constitutions are complex, relationally negotiated and composed and that motherhood is an enduring way of being. Through these illustrations, this research engages with and extends understandings of difference feminism. This research, however, not only rejects, repudiates and contests (Nelson 2001) the narrowly defined canonical maternal identity. By illuminating and articulating the goods which shape and inspire these "mature" mothers' motherwork, this research offers a matricentric account which is consistent with and respectful of the particular, situated realities—the broader familial, social, institutional, but most importantly, moral values and frameworks—in which each mother‘s life is embedded and her motherwork oriented. By understanding and appreciating the complex and multiple webs of relationships in which each mother exists, this matricentric re-stor(y)ing of maternal experiences not only understands and appreciates the unique nature of each mother‘s existing realities, it is oriented to the continuing enhancing of the shared pursuit of the good which underpins particular maternal practices and particular maternal ways of being.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundamental tooling is required in order to apply USDL in practical settings. This chapter discusses three fundamental types of tools for USDL. First, USDL editors have been developed for expert and casual users, respectively. Second, several USDL repositories have been built to allow editors accessing and storing USDL descriptions. Third, our generic USDL marketplace allows providers to describe their services once and potentially trade them anywhere. In addition, the iosyncrasies of service trading as opposed to the simpler case of product trading. The chapter also presents several deployment scenarios of such tools to foster individual value chains and support new business models across organizational boundaries. We close the chapter with an application of USDL in the context of service engineering.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the service-oriented architecture paradigm has become ever more popular, different standardization efforts have been proposed by various consortia to enable interaction among heterongeneous environments through this paradigm. This chapter will overview the most prevalent of these SOA approaches. It will first show how technical services can be described, how they can interact with each other and be discovered by users. Next, the chapter will present different standards to facilitate service composition and to design service-oriented environments in light of a universal understanding of service orientation. The chapter will conclude with a summary and a discussion on the limitations of the reviewed standards along their ability to describe service properties. This paves the way to the next chapters where the USDL standard will be presented, which aims to lift such limitations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enabling web-based service networks and ecosystems requires a way of describing services by a "commercial envelope" as discussed in Chapter 1. A uniform conception of services across all walks of life (including technical services) is required capturing business, operational and technical aspects. Therefore, our proposed Unified Service Description Language (USDL) particularly draws from and generalizes the best-of-breed approaches presented in Part I. The following chapter presents the design rationale of USDL where the different aspects are put in a framework of descriptions requirements. This is followed by the subsequent chapters of this part that provide details on specific aspects such as pricing or legal issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Grandiflora: Recent Paintings by Daniel Mafe The paintings of Grandiflora are improvised around a range of different flower motifs culled from medieval textiles and botanical illustrations. Each of the paintings is constructed upon a ground of flat, palely luminous yellow occasionally supplemented by additional areas of high-keyed pastel. Pink, blue, green and mauve together with the yellow, generate a shimmering and even incandescent glow. The graphic images of the flowers with the flat colour areas are then contrasted and worked over with richly sensual, abstract gestures of paint. Within the work there is a pronounced almost rococo-esque opticality as it operates between these different visual codes of flat colour, recognizable floral forms, and gesture. These codes combine to produce a definite visceral impact on the viewer, a pronounced and tactile sense of the experience and ambiguity inherent in perceiving. This ambiguity is interestingly at odds with the apparently clean and crisp quality each painting demonstrates as an integrated whole. Indeed each piece goes on to reveal, despite the use of overt figurative quotations, a sense of the purely abstract which in its turn concretely establishes the ornamental.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this issue of Project Management Journal, the reader will explore different perspectives, exemplifying the dynamic and creativity at stake within the project, program, and portfolio management field. These papers provide good illustrations of the various schools of project management research I introduced in the From the Editor letters between June 2007 and September 2008...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"Young Children, Pedagogy and the Arts is an innovative text that describes practices and research that cross all five strands of the arts—visual, drama, music, dance, and media—and illuminates ways of understanding children and their arts practices that go beyond the common traditions. The book: - Offers practical and rich illustrations of teachers’ and children’s work based on international research that integrates theory with practice; - Brings a critical lens to arts education; - Includes summaries, reflective questions, and recommended further readings with every chapter. Young Children, Pedagogy and the Arts provides a more nuanced understanding of the arts through an exploration of specific instances in which committed teachers and researchers are discovering what contemporary multimodal tools offer to young children. Chapters contain examples of ‘doing’ the arts in the early years, new ways of teaching, and how to use emerging technologies to develop multiliteracies, equity, agency, social and cultural capital, and enhance the learning and engagement of marginalized children."--publisher website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present WebPut, a prototype system that adopts a novel web-based approach to the data imputation problem. Towards this, Webput utilizes the available information in an incomplete database in conjunction with the data consistency principle. Moreover, WebPut extends effective Information Extraction (IE) methods for the purpose of formulating web search queries that are capable of effectively retrieving missing values with high accuracy. WebPut employs a confidence-based scheme that efficiently leverages our suite of data imputation queries to automatically select the most effective imputation query for each missing value. A greedy iterative algorithm is also proposed to schedule the imputation order of the different missing values in a database, and in turn the issuing of their corresponding imputation queries, for improving the accuracy and efficiency of WebPut. Experiments based on several real-world data collections demonstrate that WebPut outperforms existing approaches.