832 resultados para Deployment of Federal Institutes
Resumo:
While substantial research on intelligent transportation systems has focused on the development of novel wireless communication technologies and protocols, relatively little work has sought to fully exploit proximity-based wireless technologies that passengers actually carry with them today. This paper presents the real-world deployment of a system that exploits public transit bus passengers’ Bluetooth-capable devices to capture and reconstruct micro- and macro-passenger behavior. We present supporting evidence that approximately 12% of passengers already carry Bluetooth-enabled devices and that the data collected on these passengers captures with almost 80 % accuracy the daily fluctuation of actual passengers flows. The paper makes three contributions in terms of understanding passenger behavior: We verify that the length of passenger trips is exponentially bounded, the frequency of passenger trips follows a power law distribution, and the microstructure of the network of passenger movements is polycentric.
Resumo:
The construction of menopause as a long-term risk to health and the adoption of discourses of prevention has made necessary a decision by women about medical treatment; specifically regarding the use of hormone replacement therapy. In a study of general practitioners’ accounts of menopause and treatment in Australia, women's ‘choice’, ‘informed decision-making’ and ‘empowerment’ were key themes through which primary medical care for women at menopause was presented. These accounts create a position for women defined by the concept of individual choice and an ethic of autonomy. These data are a basis for theorising more generally in this paper. We critically examine the construct of ‘informed decision-making’ in relation to several approaches to ethics including bioethics and a range of feminist ethics. We identify the intensification of power relations produced by an ethic of autonomy and discuss the ways these considerations inform a feminist ethics of decision-making by women. We argue that an ‘ethic of autonomy’ and an ‘offer of choice’ in relation to health care for women at menopause, far from being emancipatory, serves to intensify power relations. The dichotomy of choice, to take or not to take hormone replacement therapy, is required to be a choice and is embedded in relations of power and bioethical discourse that construct meanings about what constitutes decision-making at menopause. The deployment of the principle of autonomy in medical practice limits decision-making by women precisely because it is detached from the construction of meaning and the self and makes invisible the relations of power of which it is a part.
Resumo:
The coal industry in Queensland operates in a very complex regulatory environment with a matrix of Federal and State laws covering the environment, health and safety, taxation and royalties, tenure, and development approvals. The Queensland Government in 2012 recognised the validity of certain industry concerns and passed two Acts being the Environmental Protection (Greentape Reduction) Amendment Act 2012 (the Greentape Act) and the Mines Legislation (Streamlining) Amendment Act 2012 (the Streamlining Act). Other changes are foreshadowed in relation to overlapping tenure and in the development of common resources legislation. Accordingly there is a great level of activity and change that has occurred or which is on the horizon. This article focuses upon these regulatory changes and foreshadows other areas requiring consideration. It commences with a consideration of the changes that have already occurred, examines those regulatory amendments that are on the drawing board and concludes with suggestions as to further interventions and amendments that have the potential to enhance the efficiency and effectiveness of the legislative framework in which coal mining is conducted.
Resumo:
This PhD practice-led research inquiry sets out to examine and describe how the fluid interactions between memory and time can be rendered via the remediation of my painting and the construction of a digital image archive. My abstract digital art and handcrafted practice is informed by Deleuze and Guattari’s rhizomics of becoming. I aim to show that the technological mobility of my creative strategies produce new conditions of artistic possibility through the mobile principles of rhizomic interconnection, multiplicity and diversity. Subsequently through the ongoing modification of past painting I map how emergent forms and ideas open up new and incisive engagements with the experience of a ‘continual present’. The deployment of new media and cross media processes in my art also deterritorialises the modernist notion of painting as a static and two dimensional spatial object. Instead, it shows painting in a postmodern field of dynamic and transformative intermediality through digital formats of still and moving images that re-imagines the relationship between memory, time and creative practice.
Resumo:
Collisions between pedestrians and vehicles continue to be a major problem throughout the world. Pedestrians trying to cross roads and railway tracks without any caution are often highly susceptible to collisions with vehicles and trains. Continuous financial, human and other losses have prompted transport related organizations to come up with various solutions addressing this issue. However, the quest for new and significant improvements in this area is still ongoing. This work addresses this issue by building a general framework using computer vision techniques to automatically monitor pedestrian movements in such high-risk areas to enable better analysis of activity, and the creation of future alerting strategies. As a result of rapid development in the electronics and semi-conductor industry there is extensive deployment of CCTV cameras in public places to capture video footage. This footage can then be used to analyse crowd activities in those particular places. This work seeks to identify the abnormal behaviour of individuals in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM), Full-2D HMM and Spatial HMM to model the normal activities of people. The outliers of the model (i.e. those observations with insufficient likelihood) are identified as abnormal activities. Location features, flow features and optical flow textures are used as the features for the model. The proposed approaches are evaluated using the publicly available UCSD datasets, and we demonstrate improved performance using a Semi-2D Hidden Markov Model compared to other state of the art methods. Further we illustrate how our proposed methods can be applied to detect anomalous events at rail level crossings.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Despite ongoing ‘boom’ conditions in the Australian mining industry, women remain substantially and unevenly under-represented in the sector, as is the case in other resource-dependent countries. Building on the literature critiquing business-case rationales and strategies as a means to achieve women’s equality in the workplace, we examine the business case for employing more women as advanced by the Australian mining industry. Specifically, we apply a discourse analysis to seven substantial, publically-available documents produced by the industry’s national and state peak organizations between 2005 and 2013. Our study makes two contributions. First, we map the features of the business case at the sectoral rather than firm or workplace level and examine its public mobilization. Second, we identify the construction and deployment of a normative identity – ‘the ideal mining woman’ – as a key outcome of this business-case discourse. Crucially, women are therein positioned as individually responsible for gender equality in the workplace.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
Young adult (YA) literature is a socialising genre that encourages young readers to take up particular ways of relating to historical or cultural materials. The first decade of the twenty-first century witnessed a boom in Sherlockian YA fiction using the Conan Doyle canon as a context and vocabulary for stories focused on the Baker Street Irregulars as figures of identification. This paper reads YA fiction’s deployment of Conan Doyle’s fictional universe as a strategy for negotiating anxieties of adolescent masculinity, particularly in relation to literacy and social agency.
Resumo:
Since 1995 the eruption of the andesitic Soufrière Hills Volcano (SHV), Montserrat, has been studied in substantial detail. As an important contribution to this effort, the Seismic Experiment with Airgunsource-Caribbean Andesitic Lava Island Precision Seismo-geodetic Observatory (SEA-CALIPSO) experiment was devised to image the arc crust underlying Montserrat, and, if possible, the magma system at SHV using tomography and reflection seismology. Field operations were carried out in October–December 2007, with deployment of 238 seismometers on land supplementing seven volcano observatory stations, and with an array of 10 ocean-bottom seismometers deployed offshore. The RRS James Cook on NERC cruise JC19 towed a tuned airgun array plus a digital 48-channel streamer on encircling and radial tracks for 77 h about Montserrat during December 2007, firing 4414 airgun shots and yielding about 47 Gb of data. The main objecctives of the experiment were achieved. Preliminary analyses of these data published in 2010 generated images of heterogeneous high-velocity bodies representing the cores of volcanoes and subjacent intrusions, and shallow areas of low velocity on the flanks of the island that reflect volcaniclastic deposits and hydrothermal alteration. The resolution of this preliminary work did not extend beyond 5 km depth. An improved three-dimensional (3D) seismic velocity model was then obtained by inversion of 181 665 first-arrival travel times from a more-complete sampling of the dataset, yielding clear images to 7.5 km depth of a low-velocity volume that was interpreted as the magma chamber which feeds the current eruption, with an estimated volume 13 km3. Coupled thermal and seismic modelling revealed properties of the partly crystallized magma. Seismic reflection analyses aimed at imaging structures under southern Montserrat had limited success, and suggest subhorizontal layering interpreted as sills at a depth of between 6 and 19 km. Seismic reflection profiles collected offshore reveal deep fans of volcaniclastic debris and fault offsets, leading to new tectonic interpretations. This chapter presents the project goals and planning concepts, describes in detail the campaigns at sea and on land, summarizes the major results, and identifies the key lessons learned.
Resumo:
Poor compliance with speed limits is a serious safety concern in work zones. Most studies of work zone speeds have focused on descriptive analyses and statistical testing without systematically capturing the effects of vehicle and traffic characteristics. Consequently, little is known about how the characteristics of surrounding traffic and platoons influence speeds. This paper develops a Tobit regression technique for innovatively modeling the probability and the magnitude of non-compliance with speed limits at various locations in work zones. Speed data is transformed into two groups—continuous for non-compliant and left-censored for compliant drivers—to model in a Tobit model framework. The modeling technique is illustrated using speed data from three long-term highway work zones in Queensland, Australia. Consistent and plausible model estimates across the three work zones support the appropriateness and validity of the technique. The results show that the probability and magnitude of speeding was higher for leaders of platoons with larger front gaps, during late afternoon and early morning, when traffic volumes were higher, and when higher proportions of surrounding vehicles were non-compliant. Light vehicles and their followers were also more likely to speed than others. Speeding was more common and greater in magnitude upstream than in the activity area, with higher compliance rates close to the end of the activity area and close to stop/slow traffic controllers. The modeling technique and results have great potential to assist in deployment of appropriate countermeasures by better identifying the traffic characteristics associated with speeding and the locations of lower compliance.
Resumo:
Protection for employees from unfair dismissal (UFD) has been around in Australia under various guises for 30 years or so (Chapman, 2006). Labour standards, and particularly ILO Convention 158 (Convention Concerning Termination of Employment at the Initiative of the Employer 1982), underpin the adoption of a particular form of federal statutory UFD regime which first appeared in the 1993 reforms to the Industrial Relations Act 1998 (Commonwealth). Its existence, however, has not been uncontroversial, and the meaning, operation, scope and remedies have attracted attention over time. In fact, the first reforms to the federal UFD regime were undertaken under the Keating Labor government three months after they were enacted (Chapman, ibid.). Further reforms were made by the incoming Howard Liberal-national coalition government through the Workplace Relations Act 1996 (Commonwealth) (WRA), and arguably these reforms continued down the ‘contraction’ path (ibid.).
Resumo:
This PhD research has provided novel solutions to three major challenges which have prevented the wide spread deployment of speaker recognition technology: (1) combating enrolment/ verification mismatch, (2) reducing the large amount of development and training data that is required and (3) reducing the duration of speech required to verify a speaker. A range of applications of speaker recognition technology from forensics in criminal investigations to secure access in banking will benefit from the research outcomes.
Resumo:
A carer or teacher often plays the role of proxy or spokesperson for a person living with an intellectual disability or form of cognitive or sensory impairment. Our research undertook co-design with people living with cognitive and sensory impairments and their proxies in order to explore new ways of facilitating communication. We developed simple functioning interactive prototypes to support people with a diverse range of competencies to communicate and explore their use. Deployment of the prototypes enabled use, appropriation and design after design by our two participant groups; adults living with cognitive or sensory impairments and children identified with language delays and autism spectrum disorder. The prototypes supported concrete expression of likes, dislikes, capabilities, emotional wants and needs and forms of expression that hitherto had not been fostered, further informing design. Carers and designers were surprised at the ways in which the technology was used and how it fostered new forms of social interaction and expression. We elaborate on how design after design can be an effective approach for engaging people living with intellectual disabilities, giving them greater capacity for expression and power in design and offering the potential to expand and deepen their social relationships.
Resumo:
The deployment of high speed broadband around Australia offers opportunities to extend digital participation among and between regional and rural communities. Full realisation of these opportunities requires a greater understanding about community members’ current digital participation and development needs, to underpin innovative community-driven initiatives. This paper outlines the Fostering Digital Participation Project’s initial undertakings to determine current digital participation and the future digital aspirations of a number of regional and rural communities.