899 resultados para generic conventions
Resumo:
This paper describes the implementation of the first portable, embedded data acquisition unit (BabelFuse) that is able to acquire and timestamp generic sensor data and trigger General Purpose I/O (GPIO) events against a microsecond-accurate wirelessly-distributed ‘global’ clock. A significant issue encountered when fusing data received from multiple sensors is the accuracy of the timestamp associated with each piece of data. This is particularly important in applications such as Simultaneous Localisation and Mapping (SLAM) where vehicle velocity forms an important part of the mapping algorithms; on fast-moving vehicles, even millisecond inconsistencies in data timestamping can produce errors which need to be compensated for. The timestamping problem is compounded in a robot swarm environment especially if non-deterministic communication hardware (such as IEEE-802.11-based wireless) and inaccurate clock synchronisation protocols are used. The issue of differing timebases makes correlation of data difficult and prevents the units from reliably performing synchronised operations or manoeuvres. By utilising hardware-assisted timestamping, clock synchronisation protocols based on industry standards and firmware designed to minimise indeterminism, an embedded data acquisition unit capable of microsecond-level clock synchronisation is presented.
Resumo:
The common presupposition of Enterprise Systems (ES) is that they lead to significant efficiency gains. However, this is only the case for well-implemented ES that meet organisational requirements. The list of major ES implementation failures is as long as the list of success stories. We argue here that this arises from a more fundamental problem, the functionalist approach to ES development and provision. As long as vendors will continue to develop generic, difficult-to-adapt ES packages, this problem will prevail because organisations have a non-generic character. A solution to this problem can only consist in rethinking the way ES packages are provided. We propose a strict abstraction layer of ES functionalities and their representation as conceptual models. ES vendors must provide sufficient means for configuring these conceptual models. We discuss in this paper what generic situations can occur during process model configuration in order to understand process model configuration in depth.
Resumo:
As sustainability becomes an important principle guiding various human activities around the globe, the higher education sector is being asked to take an active part in educating and promoting sustainability due to its moral responsibility, social obligation and its own needs to adapt to new circumstances. There is a global trend of higher education institutions embarking on responses to the sustainability challenge. On-campus building performance is one of the most important indicators for “sustainable universities”, because buildings carry substantially environmental burden such as considerable consumption of raw materials and energy as well as huge amount of waste generation and greenhouse gas emission. Plus, much research proves that building performance can impact on students and staff’s awareness about and behaviours related to sustainability. The past studies rarely discussed about sustainable construction projects in universities’ unique context. Universities are labeled with distinct characteristics such as complex governance, multiple cultures and juggling missions and so on. It is necessary and meaningful to examine the project management system in terms of universities’ organizational environment. Thus, this research project applies Delphi study to identify primary barriers to green technology application in on-campus buildings, critical factors for sustainable project success, key actions in project phases and strategies for project improvement. Through three rounds of questionnaires among panel experts, the authors obtain a profound understanding of project delivery system in universities. The research results are expected to provide sustainability practitioners with holistic understanding and generic information about sustainable construction project performance on campus as an assistance tool.
Resumo:
The configuration of comprehensive enterprise systems to meet the specific requirements of an organisation up to today is consuming significant resources. The results of failing or delayed enterprise system implementation projects are severe and may even threaten the organisation’s existence. One of the main drivers for implementing comprehensive enterprise systems is to streamline business processes. However, an intuitive conceptual support for business process configuration is insufficiently addressed by enterprise system vendors and inadequately researched in academia. This paper presents a model-driven approach to target this problem and proposes several configuration patterns that describe generic patterns of configuration alternatives, in order to understand what situations can occur during business process configuration. Based on these configuration patterns, a configuration notation is introduced that allows for visually highlighting configuration alternatives. Finally, we will sketch how configurable Event Driven Process Chains and the configuration of business processes can be supported using relational databases.
Resumo:
This paper reviews the growing influence of human rights issues on land rights, administration, management and tenure. In the last few decades, attention focussed on integrating economic and environmental considerations to achieve sustainable land use. The World Trade Organisation began in 1995. As a condition of membership, nations undertook legislative programmes aimed at reducing price distortions and barriers to international trade. Reducing trade barriers has direct effects on agricultural production as a major land use. Similarly, as signatories to the 1992 Rio Declaration, nations undertook caring for and reporting on the state of the environment. However, quality of life is also an issue in deciding what is sustainable development. The Universal Declaration of Human Rights, proclaimed in 1948, provided a framework for a series of international human rights conventions. These conventions now influence national legislative programmes. The purpose of this paper is to review some of the implications of human rights on rights in land and the production and use of spatial information.
Resumo:
This project sought to investigate parameters of residual soil materials located in South East Queensland (SEQ), as determined from a large number of historical site investigation records. This was undertaken to quantify material parameter variability and to assess the validity of using commonly adopted correlations to estimate "typical" soil parameters for this region. A dataset of in situ and laboratory derived residual soil parameters was constructed and analysed to identify potential correlations that related either to the entire area considered, or to specific residual soils that were derived from a common parent material. The variability of SEQ soil parameters were generally found to be greater than the results of equivalent studies that analysed transported soil dominant datasets. Noteworthy differences in material properties also became evident when residual soils weathered from different parent materials were considered independently. Large variation between the correlations developed for specific soil types was found, which highligted both heterogeneity of the studied materials and the incompatibility of generic correlations to residual soils present in SEQ. Region and parent material specific correlations that estimate shear strength from in situ penetration tests have been proposed for the various residual soil types considered.
Resumo:
Australian dramatic literature of the 1950s and 1960s heralded a new wave in theatre and canonised a unique Australian identity on local and international stages. In previous decades, Australian theatre had been abound with the mythology of the wide brown land and the outback hero. This rural setting proved remote to audiences and sat uneasily within the conventions of the naturalist theatre. It was the suburban home that provided the back drop for this postwar evolution in Australian drama. While there were a number of factors that contributed to this watershed in Australian theatre, little has been written about how the spatial context may have influenced this movement. With the combined effects of postwar urbanization and shifting ideologies around domesticity, a new literary landscape had been created for playwrights to explore. Australian playwrights such as Dorothy Hewett, Ray Lawler and David Williamson transcended the outback hero by relocating him inside the postwar home. The Australian home of the 1960s slowly started subscribing to a new aesthetic of continuous living spaces and patios that extended from the exterior to the interior. These mass produced homes employed diluted spatial principles of houses designed by architects, Le Corbusier, Ludwig Mies Van der Rohe and Adolf Loos in the 1920s and 1930s. In writing about Adolf Loos’ architecture, Beatriz Colomina described the “house as a stage for the family theatre”. She also wrote that the inhabitants of Loos’ houses were “both actors and spectators of the family scene involved”. It has not been investigated as to whether this new capacity to spectate within the home was a catalyst for playwrights to reflect upon, and translate the domestic environment to the stage. Audiences were also accustomed to being spectators of domesticity and could relate to the representations of home in the theatre. Additionally, the domestic setting provided a space for gender discourse; a space in which contestations of masculine and feminine identities could be played out. This research investigates whether spectating within the domestic setting contributed to the revolution in Australian dramatic literature of the 1950s and 1960s. The concept of the spectator in domesticity is underpinned by the work of Beatriz Colomina and Mark Wigley. An understanding of how playwrights may have been influenced by spectatorship within the home is ascertained through interviews and biographical research. The paper explores playwrights’ own domestic experiences and those that have influenced the plays they wrote and endeavours to determine whether seeing into the home played a vital role in canonising the Australian identity on the stage.
Resumo:
We report on an accurate numerical scheme for the evolution of an inviscid bubble in radial Hele-Shaw flow, where the nonlinear boundary effects of surface tension and kinetic undercooling are included on the bubble-fluid interface. As well as demonstrating the onset of the Saffman-Taylor instability for growing bubbles, the numerical method is used to show the effect of the boundary conditions on the separation (pinch-off) of a contracting bubble into multiple bubbles, and the existence of multiple possible asymptotic bubble shapes in the extinction limit. The numerical scheme also allows for the accurate computation of bubbles which pinch off very close to the theoretical extinction time, raising the possibility of computing solutions for the evolution of bubbles with non-generic extinction behaviour.
Resumo:
Over the years a large set of international conventions have been adopted under the auspices of the International Maritime Organization for prevention of vessel-source marine pollution. However, most of developing countries failed to effectively implement these conventions. Against this backdrop, this article aims to assess the inherent suitability of the MARPOL Convention for implementation in developing countries. It also examines the role of global community for effective implementation of the MARPOL Convention and identifies the legal and institutional bottlenecks in the current implementation regime.
Resumo:
The international legal regime on shipbreaking is in its formative years. At the international level, the shipbreaking industry is partially governed by the Basel Convention on the Control of Transboundary Movements of Hazardous Wastes and their Disposal. However, how far this convention will be applicable for all aspects of transboundary movement of end-of-life ships is still, at least in the view of some scholars, a debatable issue. Against this backdrop, the International Maritime Organisation (IMO) has adopted a new, legally binding convention for shipbreaking. There is a rising voice from the developing countries that the convention is likely to impose more obligations on recycling facilities in the developing countries than on shipowners from rich nations. This may be identified as a clear derogation from the globally recognized international environmental law principle of common but differentiated treatment. This article will examine in detail major international conventions regulating transboundary movement and environmentally sound disposal of obsolete ships, as well as the corresponding laws of Bangladesh for implementing these conventions in the domestic arena. Moreover this article will examine in detail the recently adopted IMO Ship Recycling Convention.
Resumo:
Combating piracy at sea and apprehending pirates have been a long-standing problem for the global community. Increasing acts of piracy off the coast of Somalia have prompted the UN Security Council to intervene in the matter. The Council, through several resolutions, has authorised states to take action against Somali pirates in the territorial waters and land territory of Somalia and recently adopted a resolution urging all states to fully implement relevant international conventions in their domestic legal systems. However, despite the Security Council's intervention in the matter most states are still reluctant to prosecute Somali pirates in their domestic courts. Considering the most recent Security Council resolution and existing international law, this article examines whether there is an international obligation to criminalise piracy under domestic legal frameworks and to prosecute pirates in domestic courts. It submits that existing international law arguably imposes an obligation to prosecute pirates, at least in certain circumstances, and the recently adopted Security Council resolution reinforces this obligation.
Resumo:
This article describes the architecture of a monitoring component for the YAWL system. The architecture proposed is based on sensors and it is realized as a YAWL service to have perfect integration with the YAWL systems. The architecture proposed is generic and applicable in different contexts of business process monitoring. Finally, it was tested and evaluated in the context of risk monitoring for business processes.
Resumo:
Adaptation of novels and other source texts into theatre has proven to be a recurring and popular form of writing through the ages. This study argues that as the theoretical discourse has moved on from outmoded notions of fidelity to original sources, the practice of adaptation is a method of re-invigorating theatre forms and inventing new ones. This practice-led research employed a tripartite methodology comprised of the writing of two play adaptations, participation by the author/researcher in their productions, and exegetical components focused on the development and deployment of analytical tools. These tools were derived from theoretical literature and a creative practice based on acquired professional artistry "learnt by doing" over a longstanding professional career as actor, director and writer. A suite of analytical tools was developed through the three phases of the first project, the adaptation of Nick Earls’ novel Perfect Skin. The tools draw on Cardwell’s "comparative analysis", which encompasses close consideration of generic context, authorial context and medium-specific context; and on Stam’s "mechanics of narrative": order, duration, frequency, the narrator and point of view. A third analytical lens was developed from an awareness of the significance of the commissioning brief and ethical considerations and obligations to the source text and its author and audience. The tripartite methodology provided an adaptation template that was applied to the writing and production of the second play Red Cap, which used factual and anecdotal sources. The second play’s exegesis (Chapter 10) analyses the effectiveness of the suite of analytical tools and the reception of the production in order to conclude the study with a workable model for use in the practice of adapting existing texts, both factual and fictional, for the theatre.
Resumo:
Over a seven-year period, Mark Radvan directed a suite of children’s theatre productions adapted from the original Tashi stories by Australian writers Anna and Barbara Fienberg. The Tashi Project’s repertoire of plays performed to over 40,000 children aged between 3 and 10 years old, and their carers, in seasons at the Out of the Box Festival, at Brisbane Powerhouse and in venues across Australia in two interstate tours in 2009 and 2010. The project investigated how best to combine an exploration of theatrical forms and conventions, with a performance style evolved in a specially developed training program and a deliberate positioning of young children as audiences capable of sophisticated readings of action, symbol, theme and character. The results of this project show that when brought into appropriate relationship with the theatre artists, young children aged 3-5 can engage with sophisticated narrative forms, and with the right contextual framing they enjoy heightened dramatic and emotional tension, bringing to the event sustained and highly engaged concentration. Older children aged 6-10 also bring sustained and heightened engagement to the same stories, providing that other more sophisticated dramatic elements are woven into the construction of the performances, such as character, theme and style.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.