963 resultados para Shimura Variety
Resumo:
Nightclubs are businesses. Their business is pleasure; however pleasure has its price. People have become increasingly concerned about the problems of violence in society but why do higher levels of violence occur in nightclubs despite the established patterns of behaviour that dictates how we socialise and act? In response, researchers have focused on identifying social and situational factors that may contribute to violence from a government perspective, focusing on a variety of specific issues ranging from financial standpoints with effective target marketing strategies to legal obligations of supplying alcohol and abiding regulatory conditions. There is little research into specific design properties that can determine design standards to ensure/improve the physical design of nightclub environments to reduce patron violence. To address this gap, this current article aims to understand how people experience and respond to the physical environment of nightclubs and how these spaces influence their behaviour. The first section of this paper examines the background on nightclubs and theories concerning the influence of pleasure. The second section of this paper details the findings of existing studies that have examined the nightlife context and the various factors that influence patron violence. The main finding of this paper is that although alcohol likely plays a contributing role in aggressive patron behaviour, there is evidence that the relationship is moderated by a number of significant factors relating to the characteristics of the drinking environment such as: physical comfort; the degree of overall 'permissiveness‘ in the establishment; crowding; and physical environmental elements most influenced by day to-day management practices such as lighting, ventilation, cleanliness and seating arrangements. The findings from this paper have been used to develop a framework to guide exploratory research on how specific elements of the physical environment of nightclubs have an impact on elevated patron aggression and assault (Koleczko & Garcia Hansen, 2011).
Resumo:
Violence in nightclubs is a serious problem that has the Australian government launching multimillion dollar drinking campaigns. Research on nightclub violence has focused on identifying contributing social and environmental factors, with many concentrating on a variety of specific issues ranging from financial standpoints with effective target marketing strategies to legal obligations of supplying alcohol and abiding regulatory conditions. Moreover, existing research suggests that there is no single factor that directly affects the rate violence in licensed venues. As detailed in the review paper of Koleczko and Garcia Hansen (2011), there is little research about the physical environment of nightclubs and which specific design properties can be used to determine design standards to ensure/improve the physical design of nightclub environments to reduce patron violence. This current study seeks to address this omission by reporting on a series of interviews with participants from management and design domains. Featured case studies are both located in Fortitude Valley, a Mecca for party-goers and the busiest nightclub district in Queensland. The results and analysis support the conclusions that a number of elements of the physical environment influence elevated patron aggression and assault.
Resumo:
An increasing number of studies are highlighting the alarming proportion of motorists that drive after having consumed illicit drugs. However presently, little attention has focused on the factors that may facilitate drug driving from a criminogenic paradigm. This study evaluated the contribution of deterrence, defiance, and deviance theories on intentions to drug drive to determine factors that might facilitate or reduce this behaviour. A total of 922 individuals completed a questionnaire that assessed frequency of drug use and a variety of perceptions on deterrence, defiance, and deviance constructs. The analysis showed that the defiance constructs (i.e., experiencing feelings of shame and believing in the legitimacy of sanctioning authority) and the deviance constructs (i.e., moral attachment to the norm and having a criminal conviction) were predictive of drug driving intentions. The facets of deterrence theory were not found to be significant predictors. Ultimately, this study illustrates that a range of behavioural and perceptual factors have the capacity to influence decisions to drug drive. As a result, there appears the need to extend the focus of research endeavours beyond legal sanctions to examine other factors that may be utilised to both understand the aetiology of drug driving as well as increase the possibility of compliance with the corresponding legislation.
Resumo:
Internationally universities have been characterised by shrinking government funding, fierce competition for student enrolments, and greater pressures to become commercially viable. It is against this complex background that academic leaders have been required to confront and resolve a multitude of conflicting interests as they seek to balance a variety of values in their decision-making processes. In this article we put forward a model of ethical decision-making developed from empirical research and literature. To test the efficacy of the model, a case scenario is posed. The article concludes by raising a number of implications for academic leaders regarding ongoing professional learning needed in this area.
Resumo:
With the identification of common single locus point mutations as risk factors for thrombophilia, many DNA testing methodologies have been described for detecting these variations. Traditionally, functional or immunological testing methods have been used to investigate quantitative anticoagulant deficiencies. However, with the emergence of the genetic variations, factor V Leiden, prothrombin 20210 and, to a lesser extent, the methylene tetrahydrofolate reductase (MTHFR677) and factor V HR2 haplotype, traditional testing methodologies have proved to be less useful and instead DNA technology is more commonly employed in diagnostics. This review considers many of the DNA techniques that have proved to be useful in the detection of common genetic variants that predispose to thrombophilia. Techniques involving gel analysis are used to detect the presence or absence of restriction sites, electrophoretic mobility shifts, as in single strand conformation polymorphism or denaturing gradient gel electrophoresis, and product formation in allele-specific amplification. Such techniques may be sensitive, but are unwielding and often need to be validated objectively. In order to overcome some of the limitations of gel analysis, especially when dealing with larger sample numbers, many alternative detection formats, such as closed tube systems, microplates and microarrays (minisequencing, real-time polymerase chain reaction, and oligonucleotide ligation assays) have been developed. In addition, many of the emerging technologies take advantage of colourimetric or fluorescence detection (including energy transfer) that allows qualitative and quantitative interpretation of results. With the large variety of DNA technologies available, the choice of methodology will depend on several factors including cost and the need for speed, simplicity and robustness. © 2000 Lippincott Williams & Wilkins.
Resumo:
A constraints- based framework for understanding processes of movement coordination and control is predicated on a range of theoretical ideas including the work of Bernstein (1967), Gibson (1979), Newell (1986) and Kugler, Kelso & Turvey (1982). Contrary to a normative perspective that focuses on the production of idealized movement patterns to be acquired by children during development and learning (see Alain & Brisson, 1986), this approach formulates the emergence of movement co- ordination as a function of the constraints imposed upon each individual. In this framework, cognitive, perceptual and movement difficulties and disorders are considered to be constraints on the perceptual- motor system, and children’s movements are viewed as emergent functional adaptations to these constraints (Davids et al., 2008; Rosengren, Savelsbergh & van der Kamp, 2003). From this perspective, variability of movement behaviour is not viewed as noise or error to be eradicated during development, but rather, as essentially functional in facilitating the child to satisfy the unique constraints which impinge on his/her developing perceptual- motor and cognitive systems in everyday life (Davids et al., 2008). Recently, it has been reported that functional neurobiological variability is predicated on system degeneracy, an inherent feature of neurobiological systems which facilitates the achievement of task performance goals in a variety of different ways (Glazier & Davids, 2009). Degeneracy refers to the capacity of structurally different components of complex movement systems to achieve different performance outcomes in varying contexts (Tononi et al., 1999; Edelman & Gally, 2001). System degeneracy allows individuals with and without movement disorders to achieve their movement goals by harnessing movement variability during performance. Based on this idea, perceptual- motor disorders can be simply viewed as unique structural and functional system constraints which individuals have to satisfy in interactions with their environments. The aim of this chapter is to elucidate how the interaction of structural and functional organismic, and environmental constraints can be harnessed in a nonlinear pedagogy by individuals with movement disorders.
Resumo:
The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, a cryptographic countermeasure which provides a form of gradual authentication by requiring the client to solve some computationally difficult problems before access is granted. In particular, we describe a mechanism for integrating a hash-based puzzle into existing web services frameworks and analyze the effectiveness of the countermeasure using a variety of scenarios on a network testbed. Client puzzles are an effective defence against flooding attacks. They can also mitigate certain types of semantic-based attacks, although they may not be the optimal solution.
Investigating child participation in the everyday talk of teacher and children in a preparatory year
Resumo:
In early years research, policy and education, a democratic perspective that positions children as participants and citizens is increasingly emphasized. These ideas take seriously listening to children’s opinions and respecting children’s influence over their everyday affairs. While much political and social investment has been paid to the inclusion of participatory approaches little has been reported on the practical achievement of such an approach in the day to day of early childhood education within school settings. This paper investigates talk and interaction in the everyday activities of a teacher and children in an Australian preparatory class (for children age 4-6 years) to see how ideas of child participation are experienced. We use an interactional analytic approach to demonstrate how participatory methods are employed in practical ways to manage routine interactions. Analysis shows that whilst the teacher seeks the children’s opinion and involves them in decision-making, child participation is at times constrained by the context and institutional categories of “teacher” and “student” that are jointly produced in their talk. The paper highlights tensions that arise for teachers as they balance a pedagogical intent of “teaching” and the associated institutional expectations, with efforts to engage children in decision-making. Recommendations include adopting a variety of conversational styles when engaging with children; consideration of temporal concerns and the need to acknowledge the culture of the school.
Resumo:
The role of the occupational health nurse is broad and includes health care provider, manager/coordinator, educator/advisor, and case manager and consultant, depending on the type of industry and the country in which the nurse practices. Regardless of the type of role, the occupational health nurse must participate in continuing nursing education (CNE) activities. This study describes the roles, credentials, and number of CNE activities undertaken by occupational health nurses working in Ontario, Canada. Using a non-experimental descriptive design, a questionnaire was mailed to all practicing occupational health nurses who are members (n = 900) of a local nursing association. Three hundred fifty-four questionnaires were returned. Nurses reported a variety of roles in the following categories: case management, health promotion, policy development, infection control/travel health, ergonomics, education, research, health and safety, direct care, consultation, disaster preparedness, and industrial hygiene. Sixty-five percent of nurses held an occupational health nurse credential, and 19% of nurses attended more than 100 hours of CNE annually. Occupational health nurses have multiple workplace roles. Many attend CNE activities and they often prepare for credentialing.
Resumo:
Many of the classification algorithms developed in the machine learning literature, including the support vector machine and boosting, can be viewed as minimum contrast methods that minimize a convex surrogate of the 0–1 loss function. The convexity makes these algorithms computationally efficient. The use of a surrogate, however, has statistical consequences that must be balanced against the computational virtues of convexity. To study these issues, we provide a general quantitative relationship between the risk as assessed using the 0–1 loss and the risk as assessed using any nonnegative surrogate loss function. We show that this relationship gives nontrivial upper bounds on excess risk under the weakest possible condition on the loss function—that it satisfies a pointwise form of Fisher consistency for classification. The relationship is based on a simple variational transformation of the loss function that is easy to compute in many applications. We also present a refined version of this result in the case of low noise, and show that in this case, strictly convex loss functions lead to faster rates of convergence of the risk than would be implied by standard uniform convergence arguments. Finally, we present applications of our results to the estimation of convergence rates in function classes that are scaled convex hulls of a finite-dimensional base class, with a variety of commonly used loss functions.
Resumo:
This important work describes recent theoretical advances in the study of artificial neural networks. It explores probabilistic models of supervised learning problems, and addresses the key statistical and computational questions. Chapters survey research on pattern classification with binary-output networks, including a discussion of the relevance of the Vapnik Chervonenkis dimension, and of estimates of the dimension for several neural network models. In addition, Anthony and Bartlett develop a model of classification by real-output networks, and demonstrate the usefulness of classification with a "large margin." The authors explain the role of scale-sensitive versions of the Vapnik Chervonenkis dimension in large margin classification, and in real prediction. Key chapters also discuss the computational complexity of neural network learning, describing a variety of hardness results, and outlining two efficient, constructive learning algorithms. The book is self-contained and accessible to researchers and graduate students in computer science, engineering, and mathematics
Resumo:
Binary classification is a well studied special case of the classification problem. Statistical properties of binary classifiers, such as consistency, have been investigated in a variety of settings. Binary classification methods can be generalized in many ways to handle multiple classes. It turns out that one can lose consistency in generalizing a binary classification method to deal with multiple classes. We study a rich family of multiclass methods and provide a necessary and sufficient condition for their consistency. We illustrate our approach by applying it to some multiclass methods proposed in the literature.
Resumo:
Online learning algorithms have recently risen to prominence due to their strong theoretical guarantees and an increasing number of practical applications for large-scale data analysis problems. In this paper, we analyze a class of online learning algorithms based on fixed potentials and nonlinearized losses, which yields algorithms with implicit update rules. We show how to efficiently compute these updates, and we prove regret bounds for the algorithms. We apply our formulation to several special cases where our approach has benefits over existing online learning methods. In particular, we provide improved algorithms and bounds for the online metric learning problem, and show improved robustness for online linear prediction problems. Results over a variety of data sets demonstrate the advantages of our framework.
Resumo:
For many years mentoring has been a well-recognised learning strategy for workers in a variety of settings such as schools, hospitals, universities and other types of organisations. It has been used to induct, socialise, train and support the knowledge and skill development of novices in all types of professions, including novice leaders. Some organisations have formalised the mentoring process by introducing mentoring programs that are integral to their human resource management strategies. Other organisations employ mentoring programs to address affirmative action requirements thus providing mentoring opportunities to members of particular target groups as a means of developing their competencies and assisting their career progression. Because of the diversity of ways in which mentoring has been used in organisations it has taken different forms and been experienced by mentors and mentees in different ways. The aim of this chapter is to provide some clarity about the term ‘mentoring’ and its practice within organisations. It begins with an exploration of the meaning and purposes of mentoring before reviewing some of the benefits and drawbacks the process provides for mentors, persons who are mentored (i.e. mentees) and for the organisation as a whole. The chapter also considers a number of issues that are important for program planners, as well as issues that mentors and mentees should understand if they are going to make the most out of their mentoring relationship.
Resumo:
We consider the problem of how to construct robust designs for Poisson regression models. An analytical expression is derived for robust designs for first-order Poisson regression models where uncertainty exists in the prior parameter estimates. Given certain constraints in the methodology, it may be necessary to extend the robust designs for implementation in practical experiments. With these extensions, our methodology constructs designs which perform similarly, in terms of estimation, to current techniques, and offers the solution in a more timely manner. We further apply this analytic result to cases where uncertainty exists in the linear predictor. The application of this methodology to practical design problems such as screening experiments is explored. Given the minimal prior knowledge that is usually available when conducting such experiments, it is recommended to derive designs robust across a variety of systems. However, incorporating such uncertainty into the design process can be a computationally intense exercise. Hence, our analytic approach is explored as an alternative.