976 resultados para Pickering, Timothy, 1745-1829.
Resumo:
The often competing imperatives of equity, simplicity and efficiency in the income tax regime, particularly the notion of simplicity, has been most evident within Australia’s small business sector over the last decade. In an attempt to provide tax simplification and reduce the tax compliance burden faced by Australian small businesses, provisions collectively referred to as the ‘simplified tax system’ or STS were introduced. The STS was designed to provide eligible small businesses with the option of adopting a range of ‘simplified’ tax measures designed to simplify their tax affairs whilst at the same time, reducing their tax compliance costs. Ultimately, a low take-up rate and accompanying criticisms led to a remodelled and rebadged concessionary regime known as the ‘Small Business Entity’ (SBE) regime which came into effect from 1 July 2007. This paper, through a pilot study, investigates the SBE regime though the eyes of the practitioner. In line the Australian Federal Government’s objective of simplification and reduced compliance costs, the purpose of the study was to (1) determine the extent to which the SBE concessions are being adopted by tax practitioners on behalf of their clients, (2) gain an understanding as to which individual SBE tax concessions are most favoured by practitioners, (3) determine the primary motivation as to why tax practitioners recommend particular SBE concessions to their clients, and (4) canvass the opinions of practitioners as to whether they believed that the introduction of the SBE concessions had met their stated objective of reducing tax compliance costs for small businesses. The findings of this research indicate that, while there is a perception that the SBE concessions are worth embracing, contrary to the policy intent, the reasons behind adopting the concessions was the opportunity to minimise a clients’ tax liability. It was revealed that adopting particular concessions had nothing to do with compliance costs savings and, in fact, the SBE concessions merely added another layer of complexity to an already cumbersome and complex tax code, which resulted in increased compliance costs for their small businesses clients. Further, the SBE concessions allowed tax practitioners the opportunity to engage in effective tax minimisation, thereby fulfilling the client advocacy role of the tax practitioner in maximising their clients’ tax preferences.
Resumo:
This paper proposes a nonlinear H_infinity controller for stabilization of velocities, attitudes and angular rates of a fixed-wing unmanned aerial vehicle (UAV) in a windy environment. The suggested controller aims to achieve a steady-state flight condition in the presence of wind gusts such that the host UAV can be maneuvered to avoid collision with other UAVs during cruise flight with safety guarantees. This paper begins with building a proper model capturing flight aerodynamics of UAVs. Then a nonlinear controller is developed with gust attenuation and rapid response properties. Simulations are conducted for the Shadow UAV to verify performance of the proposed con- troller. Comparative studies with the proportional-integral-derivative (PID) controllers demonstrate that the proposed controller exhibits great performance improvement in a gusty environment, making it suitable for integration into the design of flight control systems for cruise flight of UAVs.
Resumo:
This article discusses the importance of aesthetic recognition and branding for Chinese fashion designers as prerequisites for their successful positioning in a globalized marketplace. Fundamental to this process is the communication of their aesthetic in their branding process. In addition, the emergence of fashion designers of Asian-American descent who align their creative vision with a globally mainstream audience has created momentum for the new generation of mainland Chinese designers. Chinese creativity is moving to center stage as the country’s role as a leading consumer market with brands of domestic origin strengthens. Thus the aim of this article is to uncover the tension between what is, on the one hand, the need to embrace a global market, and, on the other, the desire to create the elements of a distinctly Chinese brand through aesthetic references to Chinese culture and iconography. We argue that one core element of branding is reference to heritage and tradition. Therefore to satisfy an increasingly sophisticated Chinese consumer, Chinese designers need to be able to incorporate these elements into a characteristic and well-promoted personal vision.
Resumo:
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.
Resumo:
When using a mobile device to control a cursor on a large shared display, the interaction must be carefully planned to match the environment and purpose of the systems use. We describe a ‘democratic jukebox’ system that revealed five recommendations that should be considered when designing this type of interaction relating to providing feedback to the user; how to represent users in a multi-cursor based system; where people tend to look and their expectation of how to move their cursor; the orientation of screens and the social context; and, the use of simulated users to give the real users a sense that they are engaging with a greater audience.
Resumo:
As ambient computing blends into the fabric of the modern urban environment developing a positive interplay between people, places, and technology to create enlivened, interactive cities becomes a necessary priority in how we imagine, understand, design, and develop cities. Designing technology for art, culture and gastronomic experiences, that are rich in community, can provide the means for collaborative action to (re)create cities that are lively, engaging, and promote a sense of well being as well as belonging.
Resumo:
Many computationally intensive scientific applications involve repetitive floating point operations other than addition and multiplication which may present a significant performance bottleneck due to the relatively large latency or low throughput involved in executing such arithmetic primitives on commod- ity processors. A promising alternative is to execute such primitives on Field Programmable Gate Array (FPGA) hardware acting as an application-specific custom co-processor in a high performance reconfig- urable computing platform. The use of FPGAs can provide advantages such as fine-grain parallelism but issues relating to code development in a hardware description language and efficient data transfer to and from the FPGA chip can present significant application development challenges. In this paper, we discuss our practical experiences in developing a selection of floating point hardware designs to be implemented using FPGAs. Our designs include some basic mathemati cal library functions which can be implemented for user defined precisions suitable for novel applications requiring non-standard floating point represen- tation. We discuss the details of our designs along with results from performance and accuracy analysis tests.
Resumo:
This paper studies time integration methods for large stiff systems of ordinary differential equations (ODEs) of the form u'(t) = g(u(t)). For such problems, implicit methods generally outperform explicit methods, since the time step is usually less restricted by stability constraints. Recently, however, explicit so-called exponential integrators have become popular for stiff problems due to their favourable stability properties. These methods use matrix-vector products involving exponential-like functions of the Jacobian matrix, which can be approximated using Krylov subspace methods that require only matrix-vector products with the Jacobian. In this paper, we implement exponential integrators of second, third and fourth order and demonstrate that they are competitive with well-established approaches based on the backward differentiation formulas and a preconditioned Newton-Krylov solution strategy.
Resumo:
Objectives This study evaluated the heat strain experienced by armored vehicle officers (AVOs) wearing personal body armor (PBA) in a sub-tropical climate. Methods Twelve male AVOs, aged 35-58 years, undertook an eight hour shift while wearing PBA. Heart rate and core temperature were monitored continuously. Urine specific gravity (USG) was measured before and after, and with any urination during the shift. Results Heart rate indicated an intermittent and low-intensity nature of the work. USG revealed six AVOs were dehydrated from pre through post shift, and two others became dehydrated. Core temperature averaged 37.4 ± 0.3°C, with maximum's of 37.7 ± 0.2°C. Conclusions Despite increased age, body mass, and poor hydration practices, and Wet-Bulb Globe Temperatures in excess of 30°C; the intermittent nature and low intensity of the work prevented excessive heat strain from developing.
Resumo:
Detailed representations of complex flow datasets are often difficult to generate using traditional vector visualisation techniques such as arrow plots and streamlines. This is particularly true when the flow regime changes in time. Texture-based techniques, which are based on the advection of dense textures, are novel techniques for visualising such flows. We review two popular texture based techniques and their application to flow datasets sourced from active research projects. The techniques investigated were Line integral convolution (LIC) [1], and Image based flow visualisation (IBFV) [18]. We evaluated these and report on their effectiveness from a visualisation perspective. We also report on their ease of implementation and computational overheads.
Resumo:
Airports and cities inevitably recognise the value that each brings the other; however, the separation in decision-making authority for what to build, where, when and how provides a conundrum for both parties. Airports often want a say in what is developed outside of the airport fence, and cities often want a say in what is developed inside the airport fence. Defining how much of a say airports and cities have in decisions beyond their jurisdictional control is likely to be a topic that continues so long as airports and cities maintain separate formal decision-making processes for what to build, where, when and how. However, the recent Green and White Papers for a new National Aviation Policy have made early inroads to formalising relationships between Australia’s major airports and their host cities. At present, no clear indication (within practice or literature) is evident to the appropriateness of different governance arrangements for decisions to develop in situations that bring together the opposing strategic interests of airports and cities; thus leaving decisions for infrastructure development as complex decision-making spaces that hold airport and city/regional interests at stake. The line of enquiry is motivated by a lack of empirical research on networked decision-making domains outside of the realm of institutional theorists (Agranoff & McGuire, 2001; Provan, Fish & Sydow, 2007). That is, governance literature has remained focused towards abstract conceptualisations of organisation, without focusing on the minutia of how organisation influences action in real-world applications. A recent study by Black (2008) has provided an initial foothold for governance researchers into networked decision-making domains. This study builds upon Black’s (2008) work by aiming to explore and understand the problem space of making decisions subjected to complex jurisdictional and relational interdependencies. That is, the research examines the formal and informal structures, relationships, and forums that operationalise debates and interactions between decision-making actors as they vie for influence over deciding what to build, where, when and how in airport-proximal development projects. The research mobilises a mixture of qualitative and quantitative methods to examine three embedded cases of airport-proximal development from a network governance perspective. Findings from the research provide a new understanding to the ways in which informal actor networks underpin and combine with formal decision-making networks to create new (or realigned) governance spaces that facilitate decision-making during complex phases of development planning. The research is timely, and responds well to Isett, Mergel, LeRoux, Mischen and Rethemeyer’s (2011) recent critique of limitations within current network governance literature, specifically to their noted absence of empirical studies that acknowledge and interrogate the simultaneity of formal and informal network structures within network governance arrangements (Isett et al., 2011, pp. 162-166). The combination of social network analysis (SNA) techniques and thematic enquiry has enabled findings to document and interpret the ways in which decision-making actors organise to overcome complex problems for planning infrastructure. An innovative approach to using association networks has been used to provide insights to the importance of the different ways actors interact with one another, thus providing a simple yet valuable addition to the increasingly popular discipline of SNA. The research also identifies when and how different types of networks (i.e. formal and informal) are able to overcome currently known limitations to network governance (see McGuire & Agranoff, 2011), thus adding depth to the emerging body of network governance literature surrounding limitations to network ways of working (i.e. Rhodes, 1997a; Keast & Brown, 2002; Rethemeyer & Hatmaker, 2008; McGuire & Agranoff, 2011). Contributions are made to practice via the provision of a timely understanding of how horizontal fora between airports and their regions are used, particularly in the context of how they reframe the governance of decision-making for airport-proximal infrastructure development. This new understanding will enable government and industry actors to better understand the structural impacts of governance arrangements before they design or adopt them, particularly for factors such as efficiency of information, oversight, and responsiveness to change.
Resumo:
Fast calculation of quantities such as in-cylinder volume and indicated power is important in internal combustion engine research. Multiple channels of data including crank angle and pressure were collected for this purpose using a fully instrumented diesel engine research facility. Currently, existing methods use software to post-process the data, first calculating volume from crank angle, then calculating the indicated work and indicated power from the area enclosed by the pressure-volume indicator diagram. Instead, this work investigates the feasibility of achieving real-time calculation of volume and power via hardware implementation on Field Programmable Gate Arrays (FPGAs). Alternative hardware implementations were investigated using lookup tables, Taylor series methods or the CORDIC (CoOrdinate Rotation DIgital Computer) algorithm to compute the trigonometric operations in the crank angle to volume calculation, and the CORDIC algorithm was found to use the least amount of resources. Simulation of the hardware based implementation showed that the error in the volume and indicated power is less than 0.1%.
Resumo:
The exploratory research presented in this discussion paper was undertaken as input to a major research grant application for the Australian Research Council. The research looks at the contribution of the Australian built environment to meet social and environmental needs. The paper examines the following research questions: What are the main challenges facing the Australian built environment? What types of building innovations might address those challenges? The research questions were addressed through desk-top research, involving an international review of (1) relevant academic literature in top-tier construction management and general management journals, and (2) high profile industry reports published internationally. Future research will involve assessing the diffusion of the identified building innovations and gauging their impact on social and environmental goals.
Resumo:
Although the drivers of innovation have been studied extensively in construction, greater attention is required on how innovation diffusion can be effectively assessed within this complex and interdependent project-based industry. The authors draw on a highly cited innovation diffusion model by Rogers (2006) and develop a tailored conceptual framework to guide future empirical work aimed at assessing innovation diffusion in construction. The conceptual framework developed and discussed in this paper supports a five-stage process model of innovation diffusion namely: 1) knowledge and idea generation, 2) persuasion and evaluation; 3) decision to adopt, 4) integration and implementation, and 5) confirmation. As its theoretical contribution, this paper proposes three critical measurements constructs which can be used to assess the effectiveness of the diffusion process. These measurement constructs comprise: 1) nature and introduction of an innovative idea, 2) organizational capacity to acquire, assimilate, transform and exploit an innovation, and 3) rates of innovation facilitation and adoption. The constructs are interpreted in the project-based context of the construction industry, extending the contribution of general management theorists. Research planned by the authors will test the validity and reliability of the constructs developed in this paper.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.