894 resultados para Geomorfologia - Goiania (GO)
Resumo:
This study aims to stimulate thought, debate and action for change on this question of more vigorous philanthropic funding of Australian health and medical research (HMR). It sharpens the argument with some facts and ideas about HMR funding from overseas sources. It also reports informed opinions from those working, giving and innovating in this area. It pinpoints the range of attitudes to HMR giving, both positive and negative. The study includes some aspects of Government funding as part of the equation, viewing Government as major HMR givers, with particular ability to partner, leverage and create incentives. Stimulating new philanthropy takes active outreach. The opportunity to build more dialogue between the HMR industry and the wider community is timely given the ‘licence to practice’ issues and questioned trust that applies currently somewhat both to science and to the charitable sector. This interest in improving HMR philanthropy also coincides with the launch last year by the Federal Government of Nonprofit Australia Limited (NAL), a group currently assessing infrastructure improvements to the charitable sector. History suggests no one will create this change if Research Australia does not. However, interest in change exists in various quarters. For Research Australia to successfully change the culture of Australian HMR giving, the process will drive the outcomes. Obviously stakeholder buy-in and partners will be needed and the ultimate blueprint for greater philanthropic HMR funding here will not be this document. Instead it will be the one that wears the handprint and ‘mindprint’ of the many architects and implementers interested in promoting HMR philanthropy, from philanthropists to nonprofit peaks to government policy arms. As the African proverb says, ‘If you want to go fast, go alone; but if you want to go far, go with others’.
Resumo:
Midwives are involved in a very dynamic profession. As they face their everyday tasks they encounter many different situations and a variety of people which results in a vast number of interactions. This narrative research project sought to identify some of the ‘ordinary’ encounters and interactions that midwives working in a hospital environment experience in their daily work and explore them from an ethical perspective. It found that many ethical decisions have to be made ‘on-the-run’, with no time to contemplate or decide what the best course of action might be. As ethics is embedded within every encounter a midwife has, it is essential that all midwives have an awareness and understanding of their own value systems, professional ethical codes and ethical principles that can act as guides when they have to make choices in these situations, which are frequently challenging.
Resumo:
This paper describes technologies we have developed to perform autonomous large-scale off-world excavation. A scale dragline excavator of size similar to that required for lunar excavation was made capable of autonomous control. Systems have been put in place to allow remote operation of the machine from anywhere in the world. Algorithms have been developed for complete autonomous digging and dumping of material taking into account machine and terrain constraints and regolith variability. Experimental results are presented showing the ability to autonomously excavate and move large amounts of regolith and accurately place it at a specified location.
Resumo:
Background: In health related research, it is critical not only to demonstrate the efficacy of intervention, but to show that this is not due to chance or confounding variables. Content: Single case experimental design is a useful quasi-experimental design and method used to achieve these goals when there are limited participants and funds for research. This type of design has various advantages compared to group experimental designs. One such advantage is the capacity to focus on individual performance outcomes compared to group performance outcomes. Conclusions: This comprehensive review demonstrates the benefits and limitations of using single case experimental design, its various design methods, and data collection and analysis for research purposes.
Resumo:
Introduction - The planning for healthy cities faces significant challenges due to lack of effective information, systems and a framework to organise that information. Such a framework is critical in order to make accessible and informed decisions for planning healthy cities. The challenges for planning healthy cities have been magnified by the rise of the healthy cities movement, as a result of which, there have been more frequent calls for localised, collaborative and knowledge-based decisions. Some studies have suggested that the use of a ‘knowledge-based’ approach to planning will enhance the accuracy and quality decision-making by improving the availability of data and information for health service planners and may also lead to increased collaboration between stakeholders and the community. A knowledge-based or evidence-based approach to decision-making can provide an ‘out-of-the-box’ thinking through the use of technology during decision-making processes. Minimal research has been conducted in this area to date, especially in terms of evaluating the impact of adopting knowledge-based approach on stakeholders, policy-makers and decision-makers within health planning initiatives. Purpose – The purpose of the paper is to present an integrated method that has been developed to facilitate a knowledge-based decision-making process to assist health planning Methodology – Specifically, the paper describes the participatory process that has been adopted to develop an online Geographic Information System (GIS)-based Decision Support System (DSS) for health planners. Value – Conceptually, it is an application of Healthy Cities and Knowledge Cities approaches which are linked together. Specifically, it is a unique settings-based initiative designed to plan for and improve the health capacity of Logan-Beaudesert area, Australia. This setting-based initiative is named as the Logan-Beaudesert Health Coalition (LBHC). Practical implications - The paper outlines the application of a knowledge-based approach to the development of a healthy city. Also, it focuses on the need for widespread use of this approach as a tool for enhancing community-based health coalition decision making processes.
Resumo:
Whistleblowing has often been regarded as an intrusion into the commercial functioning of organisations, and whistle-blowers have frequently found their career prospects to go into steep decline. Recent evidence, however, suggests that individuals in organisations are increasingly being encouraged to report wrongdoings, with whistle-blowing being highlighted as an effective method of reducing the costs of fraudulent activities. This single organisation case study finds that many employees are still reluctant to report wrongdoings in their workplace. This is particularly the case in respect of male employees. It is also found that those employees who do whistle-blow are motivated by feelings of loyalty towards their organisation, rather than by self-interest.
Resumo:
This paper investigates whether Socially Responsible Investment (SRI) is more or less sensitive to market downturns than conventional investment, and examines the legal implications for fund managers and trustees. Using a market model methodology, we find that over the past 15 years, the beta risk of SRI, both in Australia and internationally, increased more than that of conventional investment during economic downturns. This implies that companies acting as fund trustees, managed investment schemes and traditional institutional fund managers risk breaching their fiduciary or statutory duties if they go long - or remain long - in SRI funds during market downturns, unless perhaps relevant legislation is reformed. If reform is viewed as desirable, possible reforms could include explicitly overriding the common law to allow all traditional funds to invest in SRI; granting immunity to directors of trustee companies from potential personal liability under sections 197 or 588G et seq of the Corporations Act; allowing companies acting as trustees, managed investment schemes and traditional institutional fund managers and trustees to invest in SRI without triggering a substantial capital gains tax liability through trust resettlement; tax concessions for SRI (eg. introducing a 150% tax deduction or investment allowance for SRI); and allowing SRI sub-funds to obtain “deductible gift recipient” status or the equivalent from relevant taxation authorities. The research is important and original insofar as the assessment of risk in SRIs during market downturns is an area which has hitherto not been subjected to rigorous empirical investigation, despite its serious legal implications.
Resumo:
This paper investigates the elements which support innovative and entrepreneurial activity in New Zealand’s state owned enterprises (SOEs). An inductive case study design, involving interview data, textual analysis, and observation, was applied to three SOEs. Findings reveal that those aspects typically associated with entrepreneurship, such as innovation, risk acceptance, pro-activeness and growth, are often supported by a number of unexpected elements within the public sector. These elements include culture, branding, operational excellence, cost efficiency, and knowledge transfer. The implications are twofold. First, that innovative and entrepreneurial activity in the public sector can go beyond policy-making, with SOEs representing an important policy decision and sector of the New Zealand Government. And second, that the impact of several SOEs on international markets suggests competition on the global stage will increasingly come from both public and private sector organizations.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
A software tool (DRONE) has been developed to evaluate road traffic noise in a large area with the consideration of network dynamic traffic flow and the buildings. For more precise estimation of noise in urban network where vehicles are mainly in stop and go running conditions, vehicle sound power level (for acceleration/deceleration cruising and ideal vehicle) is incorporated in DRONE. The calculation performance of DRONE is increased by evaluating the noise in two steps of first estimating the unit noise database and then integrating it with traffic simulation. Details of the process from traffic simulation to contour maps are discussed in the paper and the implementation of DRONE on Tsukuba city is presented
Resumo:
The legal power to declare war has traditionally been a part of a prerogative to be exercised solely on advice that passed from the King to the Governor-General no later than 1942. In 2003, the Governor- General was not involved in the decision by the Prime Minister and Cabinet to commit Australian troops to the invasion of Iraq. The authors explore the alternative legal means by which Australia can go to war - means the government in fact used in 2003 - and the constitutional basis of those means. While the prerogative power can be regulated and/or devolved by legislation, and just possibly by practice, there does not seem to be a sound legal basis to assert that the power has been devolved to any other person. It appears that in 2003 the Defence Minister used his legal powers under the Defence Act 1903 (Cth) (as amended in 1975) to give instructions to the service head(s). A powerful argument could be made that the relevant sections of the Defence Act were not intended to be used for the decision to go to war, and that such instructions are for peacetime or in bello decisions. If so, the power to make war remains within the prerogative to be exercised on advice. Interviews with the then Governor-General indicate that Prime Minister Howard had planned to take the matter to the Federal Executive Council 'for noting', but did not do so after the Governor-General sought the views of the then Attorney-General about relevant issues of international law. The exchange raises many issues, but those of interest concern the kinds of questions the Governor-General could and should ask about proposed international action and whether they in any way mirror the assurances that are uncontroversially required for domestic action. In 2003, the Governor-General's scrutiny was the only independent scrutiny available because the legality of the decision to go to war was not a matter that could be determined in the High Court, and the federal government had taken action in March 2002 that effectively prevented the matter coming before the International Court of Justice
Resumo:
Helen Keller’s fight to speak, to understand, to love aided by her teacher Annie Sullivan was nothing short of a miracle. This is her story. Crossbow Productions staged six performances of The Miracle Worker at the Brisbane Powerhouse in June 2009 to raise awareness of people living with disabilities. The play was shadow signed for the hearing impaired and tactile tours of the set were held before each performance for the vision impaired. Over 200 hearing and vision impaired attended and 70 of these had never been to the theatre before. I’m deaf and we should be able to go to anything, and you’ve done that for us. As a blind person, I got a great deal from it. I found it extremely moving. There should be a thousand or so in the audience rather than a hundred so that everyone can experience it.
Resumo:
There is an increasing global reliance on the Internet for retrieving information on health, illness, and recovery (Sillence et al, 2007; Laurent et al, 2009; Adams, 2010). People suffering from a vast array of illnesses, conditions, and complaints, as well as healthy travelers seeking advice about safe practices abroad, and teens seeking information about safe sexual practices are all now more likely to go to the internet for information than they are to rely solely on a general practitioner or physician (Santor et al, 2007; Moreno et al, 2009; Bartlett et al, 2010). Women in particular seek advice and support online for a number of health-related concerns regarding issues such as puberty, conception, pregnancy, postnatal depression, mothering, breast-cancer recovery, and ageing healthily (van Zutphen, 2008; Raymond et al, 2005). In keeping with this increasing socio-technological trend, the Women’s Health Unit at the Queensland University of Technology (Q.U.T), Brisbane, Australia, introduced the research, design, and development of online information resources for issues affecting the health of Australian women as an assessment item for students in the undergraduate Public Health curriculum. Students were required to research a particular health issue affecting Australian women, including pregnancy, pregnancy terminations, postnatal depression, returning to the work force after having a baby, breast cancer recovery, chronic disease prevention, health and safety for sex-workers, and ageing healthily. Students were required to design and develop websites that supported people living with these conditions, or who were in these situations. The websites were designed for communicating effectively with both women seeking information about their health, and their health practitioners. The pedagogical challenge inherent in this exercise was twofold: firstly, to encourage students to develop the skills to design and maintain software for online health forums; and secondly, to challenge public health students to go beyond generating ‘awareness’ and imparting health information to developing a nuanced understanding of the worlds and perspectives of their audiences, who require supportive networks and options that resonate with their restrictions, capabilities, and dispositions. This latter challenge spanned the realms of research, communication, and aesthetic design. This paper firstly, discusses an increasing reliance on the Internet by women seeking health-related information and the potential health risks and benefits of this trend. Secondly, it applies a post-structural analysis of the de-centred and mobile female self, as online social ‘spaces’ and networks supersede geographical ‘places’ and hierarchies, with implications for democracy, equality, power, and ultimately women’s health. Thirdly, it depicts the processes (learning reflections) and products (developed websites) created within this Women’s Health Unit by the students. Finally, we review this development in the undergraduate curriculum in terms of the importance of providing students with skills in research, communication, and technology in order to share and implement improved health care and social marketing for women as both recipients and providers of health care in the Internet Age.
Resumo:
This paper suggests an approach for finding an appropriate combination of various parameters for extracting texture features (e.g. choice of spectral band for extracting texture feature, size of the moving window, quantization level of the image, and choice of texture feature etc.) to be used in the classification process. Gray level co-occurrence matrix (GLCM) method has been used for extracting texture from remotely sensed satellite image. Results of the classification of an Indian urban environment using spatial property (texture), derived from spectral and multi-resolution wavelet decomposed images have also been reported. A multivariate data analysis technique called ‘conjoint analysis’ has been used in the study to analyze the relative importance of these parameters. Results indicate that the choice of texture feature and window size have higher relative importance in the classification process than quantization level or the choice of image band for extracting texture feature. In case of texture features derived using wavelet decomposed image, the parameter ‘decomposition level’ has almost equal relative importance as the size of moving window and the decomposition of images up to level one is sufficient and there is no need to go for further decomposition. It was also observed that the classification incorporating texture features improves the overall classification accuracy in a statistically significant manner in comparison to pure spectral classification.
Resumo:
This workshop explores innovative approaches to understanding and cultivating sustainable food culture in urban environments via human-computer-interaction (HCI) design and ubiquitous technologies. We perceive the city as an intersecting network of people, place, and technology in constant transformation. Our 2009 OZCHI workshop, Hungry 24/7? HCI Design for Sustainable Food Culture, opened a new space for discussion on this intersection amongst researchers and practitioners from diverse backgrounds including academia, government, industry, and non-for-profit organisations. Building on the past success, this new instalment of the workshop series takes a more refined view on mobile human-food interaction and the role of interactive media in engaging citizens to cultivate more sustainable everyday human-food interactions on the go. Interactive media in this sense is distributed, pervasive, and embedded in the city as a network. The workshop addresses environmental, health, and social domains of sustainability by bringing together insights across disciplines to discuss conceptual and design approaches in orchestrating mobility and interaction of people and food in the city as a network of people, place, technology, and food.