903 resultados para Counter situations
Resumo:
This chapter introduces different theoretical approaches to negotiation and provides an explanation of these differing frameworks. While the action of a negotiation centres on the background research undertaken and what happens at the negotiation table, there is a need to know what principles and assumptions are informing these activities. Theories offer a way of understanding the underlying structures, processes and relationships of negotiation. Further, negotiation theories also assist with focusing attention on the 'basis of the bargain' and provide a standpoint from which to judge offers and counter-offers during the negotiation.
Resumo:
The effect of sample geometry on the melting rates of burning iron rods was assessed. Promoted-ignition tests were conducted with rods having cylindrical, rectangular, and triangular cross-sectional shapes over a range of cross-sectional areas. The regression rate of the melting interface (RRMI) was assessed using a statistical approach which enabled the quantification of confidence levels for the observed differences in RRMI. Statistically significant differences in RRMI were observed for rods with the same cross-sectional area but different cross-sectional shape. The magnitude of the proportional difference in RRMI increased with the cross-sectional area. Triangular rods had the highest RRMI, followed by rectangular rods, and then cylindrical rods. The dependence of RRMI on rod shape is shown to relate to the action of molten metal at corners. The corners of the rectangular and triangular rods melted faster than the faces due to their locally higher surface area to volume ratios. This phenomenon altered the attachment geometry between liquid and solid phases, increasing the surface area available for heat transfer, causing faster melting. Findings relating to the application of standard flammability test results in industrial situations are also presented.
Resumo:
Many of the teaching elements in Civil and Environmental Engineering and Spatial Science/Surveying are strongly related to multidisciplinary real-world situations. Professionals in each discipline commonly work collaboratively, knowing each other’s professional and technical limitations and requirements. Replication of such real-world situations allows students to gain an insight and acquire knowledge of professional practice for both civil engineering and spatial science disciplines. However, replication of an authentic design project is not always possible in a single unit basis where empirical project situations are often created with controlled sets of constraints, inputs and outputs. A cross-disciplinary design-based project that is designed to promote active student learning, engagement and professional integration would be the preferred option. The central aim of this collaborative project was to create positive and inclusive environments to promote engaging learning opportunities that cater for a range of learning styles with a two-way linkage involving third-year civil engineering and spatial science (surveying) students. This paper describes the cross-disciplinary project developed and delivered in 2010 and 2011. A survey was conducted at completion of the project to assess the degree of improvement in student engagement and their learning experiences. Improvements were assessed in a range of dimensions including student motivation, learning by cross-disciplinary collaboration and learning by authentic design project experiences. In this specific cross-disciplinary linkage project, the study findings showed that teaching approaches utilised have been effective in promoting active student learning and increasing engagement.
Resumo:
With the rise in attacks and attempted attacks on marine‐based critical infrastructure, maritime security is an issue of increasing importance worldwide. However, there are three significant shortfalls in the efforts to overcome potential threats to maritime security: the need for greater understanding of whether current standards of best practice are truly successful in combating and reducing the risks of terrorism and other security issues, the absence of a collective maritime security best practice framework and the need for improved access to maritime security specific graduate and postgraduate (long) courses. This paper presents an overview of existing international, regional national standards of best practice and shows that literature concerning the measurement and/ or success of standards is virtually non‐existent. In addition, despite the importance of maritime workers to ensuring the safety of marine based critical infrastructure, a similar review of available Australian education courses shows a considerable lack of availability of maritime security‐specific courses other than short courses that cover only basic security matters. We argue that the absence of an Australian best practice framework informed by evaluation of current policy responses – particularly in the post 9/11 environment – leaves Australia vulnerable to maritime security threats. As this paper shows, the reality is that despite the security measures put in place post 9/11, there is still considerable work to be done to ensure Australia is equipped to overcome the threats posed to maritime security.
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.
Resumo:
Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.
Resumo:
This article considers the question of whether creative workers demonstrate a preference for inner cities or suburbs, drawing upon research findings from the ‘Creative Suburbia’ project undertaken by a team of Australian researchers over 2008–2010 in selected suburban areas of Brisbane and Melbourne. Locating this question in wider debates about the relationship of the suburbs to the city, as well as the development of new suburban forms such as master-planned communities, the article finds that the number of creative industries workers located in the suburbs is significant, and those creative workforce members living and working in suburban areas are generally happy with this experience, locating in the suburbs out of personal choice rather than economic necessity. This runs counter to the received wisdom on creative cities, which emphasize cultural amenity in inner city areas as a primary driver of location decisions for the ‘creative class’. The article draws out some implications of the findings for urban cultural policy, arguing that the focus on developing inner urban cultural amenity has been overplayed, and that more attention should be given to how to better enable distributed knowledge systems through high-speed broadband infrastructure.
Resumo:
The quality of conceptual business process models is highly relevant for the design of corresponding information systems. In particular, a precise measurement of model characteristics can be beneficial from a business perspective, helping to save costs thanks to early error detection. This is just as true from a software engineering point of view. In this latter case, models facilitate stakeholder communication and software system design. Research has investigated several proposals as regards measures for business process models, from a rather correlational perspective. This is helpful for understanding, for example size and complexity as general driving forces of error probability. Yet, design decisions usually have to build on thresholds, which can reliably indicate that a certain counter-action has to be taken. This cannot be achieved only by providing measures; it requires a systematic identification of effective and meaningful thresholds. In this paper, we derive thresholds for a set of structural measures for predicting errors in conceptual process models. To this end, we use a collection of 2,000 business process models from practice as a means of determining thresholds, applying an adaptation of the ROC curves method. Furthermore, an extensive validation of the derived thresholds was conducted by using 429 EPC models from an Australian financial institution. Finally, significant thresholds were adapted to refine existing modeling guidelines in a quantitative way.
Resumo:
This edition of the ALAR Action learning action research journal aims to capture some of the current dilemmas, solutions and actions researchers experience in the decolonising space. This collection of papers demonstrates that researchers are not only undertaking action research with and within Indigenous and non-Indigenous contexts, but that they are doing so in exciting and dynamic ways across a diversity of situations. First we will address some of the literature on decolonisation. Then we will explain how this specific edition of the Journal came to fruition and aspects of action research.
Resumo:
This edition of the ALAR Action learning action research journal aims to capture some of the current dilemmas, solutions and actions researchers experience in the decolonising space. This collection of papers demonstrates that researchers are not only undertaking action research with and within Indigenous and non-Indigenous contexts, but that they are doing so in exciting and dynamic ways across a diversity of situations. First we will address some of the literature on decolonisation. Then we will explain how this specific edition of the Journal came to fruition and aspects of action research. This is a condensed version of the Editorial that appears in the electronic version of the Journal.
Resumo:
Commuting in various transport modes represents an activity likely to incur significant exposure to traffic emissions. This study investigated the determinants and characteristics of exposure to ultrafine (< 100 nm) particles (UFPs) in four transport modes in Sydney, with a specific focus on exposure in automobiles, which remain the transport mode of choice for approximately 70% of Sydney commuters. UFP concentrations were measured using a portable condensation particle counter (CPC) inside five automobiles commuting on above ground and tunnel roadways, and in buses, ferries and trains. Determinant factors investigated included wind speed, cabin ventilation (automobiles only) and traffic volume. The results showed that concentrations varied significantly as a consequence of transport mode, vehicle type and ventilation characteristics. The effects of wind speed were minimal relative to those of traffic volume (especially heavy diesel vehicles) and cabin ventilation, with the latter proving to be a strong determinant of UFP ingress into automobiles. The effect of ~70 minutes of commuting on total daily exposure was estimated using a range of UFP concentrations reported for several microenvironments. A hypothetical Sydney resident commuting by automobile and spending 8.5 minutes of their day in the M5 East tunnel could incur anywhere from a lower limit of 3-11% to an upper limit of 37-69% of daily UFP exposure during a return commute, depending on the concentrations they encountered in other microenvironments, the type of vehicle they used and the ventilation setting selected. However, commute-time exposures at either extreme of the values presented are unlikely to occur in practice. The range of exposures estimated for other transport modes were comparable to those of automobiles, and in the case of buses, higher than automobiles.
Resumo:
Community beliefs related to intentional injury inflicted by others were examined in a population-based telephone survey (n= 1032) in Queensland, Australia. Young adults 18-24 years were nominated as the most likely to be intentionally injured. 89.1% of respondents nominating this group believed that the injury incidents occur in alcohol environments. Though respondents from this age group also identified 18-24 yo as most likely to be intentionally injured, this was at a significantly lower level than did parents or 25-64 yo respondents. Responsibility for preventing injuries was placed on proprietors of licensed premises, schools and parents/family of the victim for alcohol, school and home environments respectively. Beliefs were aligned with prevalence data on intentional injury demonstrating a high level of awareness in the community about likely victims and situations where intentional injuries occur. Interventions could target families of young adults to capitalize on high levels of awareness about young adult vulnerability.
Resumo:
With the growing number of XML documents on theWeb it becomes essential to effectively organise these XML documents in order to retrieve useful information from them. A possible solution is to apply clustering on the XML documents to discover knowledge that promotes effective data management, information retrieval and query processing. However, many issues arise in discovering knowledge from these types of semi-structured documents due to their heterogeneity and structural irregularity. Most of the existing research on clustering techniques focuses only on one feature of the XML documents, this being either their structure or their content due to scalability and complexity problems. The knowledge gained in the form of clusters based on the structure or the content is not suitable for reallife datasets. It therefore becomes essential to include both the structure and content of XML documents in order to improve the accuracy and meaning of the clustering solution. However, the inclusion of both these kinds of information in the clustering process results in a huge overhead for the underlying clustering algorithm because of the high dimensionality of the data. The overall objective of this thesis is to address these issues by: (1) proposing methods to utilise frequent pattern mining techniques to reduce the dimension; (2) developing models to effectively combine the structure and content of XML documents; and (3) utilising the proposed models in clustering. This research first determines the structural similarity in the form of frequent subtrees and then uses these frequent subtrees to represent the constrained content of the XML documents in order to determine the content similarity. A clustering framework with two types of models, implicit and explicit, is developed. The implicit model uses a Vector Space Model (VSM) to combine the structure and the content information. The explicit model uses a higher order model, namely a 3- order Tensor Space Model (TSM), to explicitly combine the structure and the content information. This thesis also proposes a novel incremental technique to decompose largesized tensor models to utilise the decomposed solution for clustering the XML documents. The proposed framework and its components were extensively evaluated on several real-life datasets exhibiting extreme characteristics to understand the usefulness of the proposed framework in real-life situations. Additionally, this research evaluates the outcome of the clustering process on the collection selection problem in the information retrieval on the Wikipedia dataset. The experimental results demonstrate that the proposed frequent pattern mining and clustering methods outperform the related state-of-the-art approaches. In particular, the proposed framework of utilising frequent structures for constraining the content shows an improvement in accuracy over content-only and structure-only clustering results. The scalability evaluation experiments conducted on large scaled datasets clearly show the strengths of the proposed methods over state-of-the-art methods. In particular, this thesis work contributes to effectively combining the structure and the content of XML documents for clustering, in order to improve the accuracy of the clustering solution. In addition, it also contributes by addressing the research gaps in frequent pattern mining to generate efficient and concise frequent subtrees with various node relationships that could be used in clustering.
Resumo:
The emerging principle of a “responsibility to protect” (R2P) presents a direct challenge to China's traditional emphasis on the twin principles of non-intervention in the domestic affairs of other states and non-use of military force. This paper considers the evolution of China‟s relationship with R2P over the past ten years. In particular, it examines how China engaged with R2P during the recent Libyan crisis, and considers what impact this conflict may have first, on Chinese attitudes to R2P, and second, on the future development and implementation of the doctrine itself. This paper argues that China‟s decision to allow the passage of Security Council resolution 1973, authorising force in Libya, was shaped by an unusual set of pragmatic considerations, and should not be viewed as evidence of a dramatic shift in Chinese attitudes towards R2P. More broadly, controversy over the scope of NATO's military action in Libya has raised questions about R2P‟s legitimacy, which has contributed to a lack of timely international action in Syria and Yemen. In the short term at least, this post-Libya backlash against R2P is likely to constrain the Security Council‟s ability to respond decisively to other civilian protection situations.
Resumo:
This paper seeks to contribute to the emerging stream of literature on the problematics of accountability ( [McKernan, in this issue], [Messner, 2009] and [Roberts, 2009]) and the possibilities of accounterability (Kamuf, 2007) by questioning whether and how accounterability can appear as a response to the problematics of accountability's operationalisation. To answer this question, this research considers the problematics of accountability found in the limits inherent to the giving of an account (Messner, 2009), in the ambiguous relationship between accountability and transparency (Roberts, 2009), and in the as yet unresolved contradictions of accountability (McKernan, in this issue). Accounterability is seen as a practice of resisting accountability demands while giving an account. Alternative practices arising out of such resistance are inductively identified through an ethnographic study of the day-to-day practices of the Salvation Army used as an extreme case. This case shows how an ideal form of accountability raises more questions than it answers in practice, thereby leading individuals to develop their own counter-abilities. Because accountability to a Higher-Stakeholder appears to be an unreachable ideal, identifying to whom one should give an account of oneself becomes problematic. A working response to the problematics of accountability, accounterability emerges as the mechanism whereby the limits and contradictions of account giving are transformed into the conditions of its realisation: unreachable accountability is transformed into tangible day-to-day practices that may differ slightly from expected ideal conduct. It transpires from this study that the main strength of accountability lies in its ability to absorb and to override its limits and contradictions, transforming them into conditions of its possibility. As such, accounterability emerges as the ultimate manifestation of this strength.