905 resultados para Cyber-Dating
Resumo:
Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.
Resumo:
In a people-to-people matching systems, filtering is widely applied to find the most suitable matches. The results returned are either too many or only a few when the search is generic or specific respectively. The use of a sophisticated recommendation approach becomes necessary. Traditionally, the object of recommendation is the item which is inanimate. In online dating systems, reciprocal recommendation is required to suggest a partner only when the user and the recommended candidate both are satisfied. In this paper, an innovative reciprocal collaborative method is developed based on the idea of similarity and common neighbors, utilizing the information of relevance feedback and feature importance. Extensive experiments are carried out using data gathered from a real online dating service. Compared to benchmarking methods, our results show the proposed method can achieve noticeable better performance.
Resumo:
A new community and communication type of social networks - online dating - are gaining momentum. With many people joining in the dating network, users become overwhelmed by choices for an ideal partner. A solution to this problem is providing users with partners recommendation based on their interests and activities. Traditional recommendation methods ignore the users’ needs and provide recommendations equally to all users. In this paper, we propose a recommendation approach that employs different recommendation strategies to different groups of members. A segmentation method using the Gaussian Mixture Model (GMM) is proposed to customize users’ needs. Then a targeted recommendation strategy is applied to each identified segment. Empirical results show that the proposed approach outperforms several existing recommendation methods.
Resumo:
To remove the right of prisoners to vote does many things. … It signals that whatever the prisoner says is not of interest to those at the top, that you are not interested in talking to them or even listening to them, that you want to exclude them and that you have no interest in knowing about them. INTRODUCTION In June 2006, Australia passed legislation disenfranchising all prisoners serving full-time custodial sentences from voting in federal elections. This followed a succession of changes dating from 1983 that alternately extended and restricted the prisoner franchise. In 1989 and 1995, the Australian Labor Party (ALP) federal government prepared draft legislation removing any restrictions on prisoner voting rights in federal elections; the measures were defeated and withdrawn. With the 2006 legislation, the Howard Coalition government (composed of the Liberal and National parties) successfully achieved the total disenfranchisement it first sought in 1998. This chapter examines the politics and legality of the 2006 disenfranchisement. This will be approached, first, by briefly outlining the key provisions of the Commonwealth Electoral Act 1918, offering a short legislative history of prisoner franchise, and examining some of the key constitutional issues. Second, the 2006 disenfranchisement introduced in the Electoral and Referendum (Electoral Integrity and Other Measures) Act 2006 will be examined in greater detail, particularly in terms of the manner in which it was achieved and the arguments that were mobilized both in support of and against the change.
Resumo:
THE little Anglican boarding school of St Barnabas, in the misty mountain town of Ravenshoe, north Queensland, was allegedly a hotbed of physical and sexual abuse in the 1960s. North Queensland Bishop Bill Ray has confirmed the diocese has few files about the school -- which was closed mid-term in 1990 -- with suspicions they were dumped "down a well or an old mine shaft" in the district A history of brutal physical punishment and sexual abuse at the school dating from the 1960s is now emerging. Headmaster Robert Waddington, who arrived at the school from England to be headmaster in 1961, dished out daily canings to many of his young students and then allegedly raped some behind closed doors in his room or the sick bay, which were next to each other. Former St Barnabas student Bim Atkinson, now 58, and two other former students have levelled allegations against the man they called "the Wadd".
Resumo:
In order to dynamically reduce voltage unbalance along a low voltage distribution feeder, a smart residential load transfer system is discussed. In this scheme, residential loads can be transferred from one phase to another to minimize the voltage unbalance along the feeder. Each house is supplied through a static transfer switch and a controller. The master controller, installed at the transformer, observes the power consumption in each house and will determine which house(s) should be transferred from an initially connected phase to another in order to keep the voltage unbalance minimum. The performance of the smart load transfer scheme is demonstrated by simulations.
Resumo:
A novel intelligent online demand management system is discussed in this chapter for peak load management in low voltage residential distribution networks based on the smart grid concept. The discussed system also regulates the network voltage, balances the power in three phases and coordinates the energy storage within the network. This method uses low cost controllers, with two-way communication interfaces, installed in costumers’ premises and at distribution transformers to manage the peak load while maximizing customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by a MATLAB-based simulation which includes detailed modeling of residential loads and the network.
Resumo:
The Warburton-Cooper basins, central Australia, include a multitude of reactivated fracture-fault networks related to a complex, and poorly understood, tectonic evolution. We investigated authigenic illites from a granitic intrusion and sedimentary rocks associated with prominent structural features (Gidgealpa-Merrimelia-Innamincka Ridge and the Nappamerri Trough). These were analysed by 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd geochronology to explore the thermal and tectonic histories of central Australian basins. The combined age data provide evidence for three major periods of fault reactivation throughout the Phanerozoic. While Carboniferous (323.3 ± 9.4 Ma) and Late Triassic ages (201.7 ± 9.3 Ma) derive from basin-wide hydrothermal circulation, Cretaceous ages (~128 to ~86 Ma) reflect episodic fluid flow events restricted to the synclinal Nappamerri Trough. Such events result from regional extensional tectonism derived from the transferral of far-field stresses to mechanically and thermally weakened regions of the Australian continent. Specifically, Cretaceous ages reflect continent-wide transmission of tensional stress from a > 2500 km long rifting event on the Eastern (and southern) Australian margin associated with break-up of Gondwana and opening of the Tasman Sea. By integrating 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd dating, this study highlights the use of authigenic illite in temporally constraining the tectonic evolution of intracontinental basins that would otherwise remain unknown. Furthermore, combining Sr- and Ar-isotopic systems enables more accurate dating of authigenesis whilst significantly reducing geochemical pitfalls commonly associated with these radioisotopic dating methods.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
The life history strategies of massive Porites corals make them a valuable resource not only as key providers of reef structure, but also as recorders of past environmental change. Yet recent documented evidence of an unprecedented increase in the frequency of mortality in Porites warrants investigation into the history of mortality and associated drivers. To achieve this, both an accurate chronology and an understanding of the life history strategies of Porites are necessary. Sixty-two individual Uranium–Thorium (U–Th) dates from 50 dead massive Porites colonies from the central inshore region of the Great Barrier Reef (GBR) revealed the timing of mortality to have occurred predominantly over two main periods from 1989.2 ± 4.1 to 2001.4 ± 4.1, and from 2006.4 ± 1.8 to 2008.4 ± 2.2 A.D., with a small number of colonies dating earlier. Overall, the peak ages of mortality are significantly correlated with maximum sea-surface temperature anomalies. Despite potential sampling bias, the frequency of mortality increased dramatically post-1980. These observations are similar to the results reported for the Southern South China Sea. High resolution measurements of Sr/Ca and Mg/Ca obtained from a well preserved sample that died in 1994.6 ± 2.3 revealed that the time of death occurred at the peak of sea surface temperatures (SST) during the austral summer. In contrast, Sr/Ca and Mg/Ca analysis in two colonies dated to 2006.9 ± 3.0 and 2008.3 ± 2.0, suggest that both died after the austral winter. An increase in Sr/Ca ratios and the presence of low Mg-calcite cements (as determined by SEM and elemental ratio analysis) in one of the colonies was attributed to stressful conditions that may have persisted for some time prior to mortality. For both colonies, however, the timing of mortality coincides with the 4th and 6th largest flood events reported for the Burdekin River in the past 60 years, implying that factors associated with terrestrial runoff may have been responsible for mortality. Our results show that a combination of U–Th and elemental ratio geochemistry can potentially be used to precisely and accurately determine the timing and season of mortality in modern massive Porites corals. For reefs where long-term monitoring data are absent, the ability to reconstruct historical events in coral communities may prove useful to reef managers by providing some baseline knowledge on disturbance history and associated drivers.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
Resumo:
Marine sediments around volcanic islands contain an archive of volcaniclastic deposits, which can be used to reconstruct the volcanic history of an area. Such records hold many advantages over often incomplete terrestrial datasets. This includes the potential for precise and continuous dating of intervening sediment packages, which allow a correlatable and temporally-constrained stratigraphic framework to be constructed across multiple marine sediment cores. Here, we discuss a marine record of eruptive and mass-wasting events spanning ~250 ka offshore of Montserrat, using new data from IODP Expedition 340, as well as previously collected cores. By using a combination of high-resolution oxygen isotope stratigraphy, AMS radiocarbon dating, biostratigraphy of foraminifera and calcareous nannofossils and clast componentry, we identify five major events at Soufriere Hills volcano since 250 ka. Lateral correlation of these events across sediment cores collected offshore of the south and south west of Montserrat, have improved our understanding of the timing, extent and associations between events in this area. Correlations reveal that powerful and potentially erosive density-currents travelled at least 33 km offshore, and demonstrate that marine deposits, produced by eruption-fed and mass-wasting events on volcanic islands, are heterogeneous in their spatial distribution. Thus, multiple drilling/coring sites are needed to reconstruct the full chronostratigraphy of volcanic islands. This multidisciplinary study will be vital to interpreting the chaotic records of submarine landslides at other sites drilled during Expedition 340 and provides a framework that can be applied to the stratigraphic analysis of sediments surrounding other volcanic islands.
Resumo:
This study investigated bullying amongst siblings in both traditional and cyber forms, and the associations of gender, grade, peer bullying perpetration, trait anger and moral disengagement. The participants were 455 children in grades 5 to 12 (262 girls and 177 boys with 16 unknown gender) who had a sibling. As the number of siblings who only bullied by technology was low, these associations were not able to be calculated. However, the findings showed that the percentage of sibling traditional bullying perpetration (31.6%) was higher than peer bullying perpetration (9.8%). Sibling bullies reported engaging in complex behaviours of perpetration and victimisation in both the physical and in cyber settings, although the number was small. Gender, trait anger, moral disengagement and bullying peers at school (but not grade) were all significantly associated with sibling traditional bullying perpetration. The implications of the findings are discussed for bullying intervention and prevention programs to understand childhood bullying in diverse contexts.