827 resultados para Actor network theory
Resumo:
In this contribution, a stability analysis for a dynamic voltage restorer (DVR) connected to a weak ac system containing a dynamic load is presented using continuation techniques and bifurcation theory. The system dynamics are explored through the continuation of periodic solutions of the associated dynamic equations. The switching process in the DVR converter is taken into account to trace the stability regions through a suitable mathematical representation of the DVR converter. The stability regions in the Thevenin equivalent plane are computed. In addition, the stability regions in the control gains space, as well as the contour lines for different Floquet multipliers, are computed. Besides, the DVR converter model employed in this contribution avoids the necessity of developing very complicated iterative map approaches as in the conventional bifurcation analysis of converters. The continuation method and the DVR model can take into account dynamics and nonlinear loads and any network topology since the analysis is carried out directly from the state space equations. The bifurcation approach is shown to be both computationally efficient and robust, since it eliminates the need for numerically critical and long-lasting transient simulations.
Resumo:
This research provides a systematic and theoretical analysis of the digital challenges to the established exclusive regime of the economic rights enjoyed by authors (and related rightholders) under the law of copyright. Accordingly, this research has developed a relational theory of authorship and a relational approach to copyright, contending that the regulatory emphasis of copyright law should focus on the facilitation of the dynamic relations between the culture, the creators, the future creators, the users and the public, rather than the allocation of resources in a static world. In this networked digital world, the creative works and contents have become increasingly vital for people to engage in creativity and cultural innovation, and for the evolution of the economy. Hence, it is argued that today copyright owners, as content holders, have certain obligations to make their works accessible and available to the public under fair conditions. This research sets forward a number of recommendations for the reform of the current copyright system.
Resumo:
Hydrogels, which are three-dimensional crosslinked hydrophilic polymers, have been used and studied widely as vehicles for drug delivery due to their good biocompatibility. Traditional methods to load therapeutic proteins into hydrogels have some disadvantages. Biological activity of drugs or proteins can be compromised during polymerization process or the process of loading protein can be really timeconsuming. Therefore, different loading methods have been investigated. Based on the theory of electrophoresis, an electrochemical gradient can be used to transport proteins into hydrogels. Therefore, an electrophoretic method was used to load protein in this study. Chemically and radiation crosslinked polyacrylamide was used to set up the model to load protein electrophoretically into hydrogels. Different methods to prepare the polymers have been studied and have shown the effect of the crosslinker (bisacrylamide) concentration on the protein loading and release behaviour. The mechanism of protein release from the hydrogels was anomalous diffusion (i.e. the process was non-Fickian). The UV-Vis spectra of proteins before and after reduction show that the bioactivities of proteins after release from hydrogel were maintained. Due to the concern of cytotoxicity of residual monomer in polyacrylamide, poly(2-hydroxyethyl- methacrylate) (pHEMA) was used as the second tested material. In order to control the pore size, a polyethylene glycol (PEG) porogen was introduced to the pHEMA. The hydrogel disintegrated after immersion in water indicating that the swelling forces exceeded the strength of the material. In order to understand the cause of the disintegration, several different conditions of crosslinker concentration and preparation method were studied. However, the disintegration of the hydrogel still occurred after immersion in water principally due to osmotic forces. A hydrogel suitable for drug delivery needs to be biocompatible and also robust. Therefore, an approach to improving the mechanical properties of the porogen-containing pHEMA hydrogel by introduction of an inter-penetrating network (IPN) into the hydrogel system has been researched. A double network was formed by the introduction of further HEMA solution into the system by both electrophoresis and slow diffusion. Raman spectroscopy was used to observe the diffusion of HEMA into the hydrogel prior to further crosslinking by ã-irradiation. The protein loading and release behaviour from the hydrogel showing enhanced mechanical property was also studied. Biocompatibility is a very important factor for the biomedical application of hydrogels. Different hydrogels have been studied on both a three-dimensional HSE model and a HSE wound model for their biocompatibilities. They did not show any detrimental effect to the keratinocyte cells. From the results reported above, these hydrogels show good biocompatibility in both models. Due to the advantage of the hydrogels such as the ability to absorb and deliver protein or drugs, they have potential to be used as topical materials for wound healing or other biomedical applications.
Resumo:
Different from conventional methods for structural reliability evaluation, such as, first/second-order reliability methods (FORM/SORM) or Monte Carlo simulation based on corresponding limit state functions, a novel approach based on dynamic objective oriented Bayesian network (DOOBN) for prediction of structural reliability of a steel bridge element has been proposed in this paper. The DOOBN approach can effectively model the deterioration processes of a steel bridge element and predict their structural reliability over time. This approach is also able to achieve Bayesian updating with observed information from measurements, monitoring and visual inspection. Moreover, the computational capacity embedded in the approach can be used to facilitate integrated management and maintenance optimization in a bridge system. A steel bridge girder is used to validate the proposed approach. The predicted results are compared with those evaluated by FORM method.
Resumo:
Speeding in school zones is a problem in both Malaysia and Australia. While there are differences between the countries in terms of school zone treatments and more generally, these differences do not explain why people choose to speed in school zones. Because speeding is usually an intentional behaviour, the Theory of Planned Behaviour (TPB) has been used to understand speeding and develop interventions, however it has limitations which can be addressed by extending the model to incorporate other constructs. One promising construct is mindfulness, which can improve the explanatory value of the TPB by taking into account unintentional speeding attributable to a lack of focus on important elements of the driving environment. We explain what mindfulness is (and is not), how it can assist in providing a better understanding of speeding in school zones, and how it can contribute to the development of interventions. We then outline a program of research which has been commenced, investigating the contribution of mindfulness to an understanding of speed choice in school zones in two different settings (Australia and Malaysia) using the TPB.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
The aim of this thesis has been to map the ethical journey of experienced nurses now practising in rural and remote hospitals in central and south-west Queensland and in domiciliary services in Brisbane. One group of the experienced nurses in the study were Directors of Nursing in rural and remote hospitals. These nurses were “hands on”, “multi-skilled “ nurses who also had the task of managing the hospital. Also there were two Directors of Nursing from domiciliary services in Brisbane. A grounded theory method was used. The nurses were interviewed and the data retrieved from the interviews was coded, categorised and from these categories a conceptual framework was generated. The literature which dealt with the subject of ethical decision making and nurses also became part of the data. The study revealed that all these nurses experienced moral distress as they made ethical decisions. The decision making categories revealed in the data were: the area of financial management; issues as end of life approaches; allowing to die with dignity; emergency decisions; experience of unexpected death; the dilemma of providing care in very difficult circumstances. These categories were divided into two chapters: the category related to administrative and financial constraints and categories dealing with ethical issues in clinical settings. A further chapter discussed the overarching category of coping with moral distress. These experienced nurses suffered moral distress as they made ethical decisions, confirming many instances of moral distress in ethical decision making documented in the literature to date. Significantly, the nurses in their interviews never mentioned the ethical principles used in bioethics as an influence in their decision making. Only one referred to lectures on ethics as being an influence in her thinking. As they described their ethical problems and how they worked through them, they drew on their own previous experience rather than any knowledge of ethics gained from nursing education. They were concerned for their patients, they spoke from a caring responsibility towards their patients, but they were also concerned for justice for their patients. This study demonstrates that these nurses operated from the ethic of care, tempered with the ethic of responsibility as well as a concern for justice for their patients. Reflection on professional experience, rather than formal ethics education and training, was the primary influence on their ethical decision making.
Resumo:
Purpose: The purpose of this paper is to explain variations in discretionary information shared between buyers and key suppliers. The paper also aims to examine how the extent of information shared affects buyers’ performance in terms of resource usage, output, and flexibility. ----- ----- Design/methodology/approach: The data for the paper comprise 221 Finnish and Swedish non-service companies obtained through a mail survey. The hypothesized relationships were tested using partial least squares modelling with reflective and formative constructs.----- ----- Findings: The results of the study suggest that (environmental and demand) uncertainty and interdependency can to some degree explain the extent of information shared between a buyer and key supplier. Furthermore, information sharing improves buyers’ performance with respect to resource usage, output, and flexibility.----- ----- Research limitations/implications: A limitation to the paper relates to the data, which only included buyers.Abetter approach would have been to collect data from both, buyers and key suppliers. Practical implications – Companies face a wide range of supply chain solutions that enable and encourage collaboration across organizations. This paper suggests a more selective and balanced approach toward adopting the solutions offered as the benefits are contingent on a number of factors such as uncertainty. Also, the risks of information sharing are far too high for a one size fits all approach.----- ----- Originality/value: The paper illustrates the applicability of transaction cost theory to the contemporary era of e-commerce. With this finding, transaction cost economics can provide a valuable lens with which to view and interpret interorganizational information sharing, a topic that has received much attention in the recent years.
Resumo:
This paper seeks to assimilate Queer Theory: that is, to bring it within the gambit of a ‘mainstream’ or ‘dominant’ space: the academy. It does so by historicising Queer Theory, and investigating, if not what it is, then at least what it has been. This makes it possible to engage critically with Queer Theory. Suggesting that Queer Theory has often employed tropes of assimilation, the paper turns to another cultural site at which such language is popular - science fiction - in order to investigate the assumption of these metaphors. It goes on to suggest some of the assumptions about cultures which underlie these metaphors. Finally, it points to other sites in Queer Theory which undermines these assumptions, and provide other ways - quite uninterested in assimilation - in which to think Queer.
Resumo:
Bringing together the voices of leading and emerging scholars, this book provides critical approaches for reading children's literature and film. It argues for the significance of theory for reading texts written and produced for young people and integrates a wide range of critical perspectives, including schema theory, theories of space and place, cultural globalization, feminism, ecocriticism, adaptation theory, postcolonialism, and posthumanism.
Resumo:
In a report in the New York Times about a public symposium on the future of theory held at University of Chicago in 2002, staff writer Emily Eakin suggests that theory appears to have taken a back seat to more pressing current affairs – the Bush Administration, Al Qaeda, Iraq. Further, she reports that the symposium’s panel of high-profile theorists and scholars, including Homi Bhabha, Stanley Fish, Fredric Jameson, seemed reticent to offer their views on what is often touted as the demise or irrelevance of theory. The symposium and other commentaries on the topic of theory have prompted the view that the ‘Golden Age of Theory’ has passed and we are now in a ‘Post-Theory Age’. Given these pronouncements, we need to ask – Does theory matter any longer? Is it time for the obituary? Or are reports of the death of theory greatly exaggerated? The question remains whether to mourn or celebrate the demise of theory, and whether the body has in fact breathed its last. The title of this Introduction – ‘Bringing back theory’ – suggests a resurrection, or perhaps a haunting, as if the funeral has passed and, like Banquo’s ghost, theory returns to unsettle or disturb the celebration. It also suggests an entreaty, or perhaps a return performance. Rather than settle on one meaning, one interpretation, we are happy for all possibilities to coexist. The coexistence of different theories, different approaches, different interpretations also reflects the state of literary and cultural studies generally and children’s literature criticism in particular. No single theory or viewpoint predominates or vies for hegemony. Yet, one further question lingers – what is theory?
Resumo:
The broad research questions of the book are: How can successful, interdisciplinary collaboration contribute to research innovation through Practice-led research? What contributes to the design, production and curation of successful new media art? What are the implications of exhibiting it across dual sites for artists, curators and participant audiences? Is it possible to create an 'intimate transaction' between people who are separated by vast distances but joined by interfaces and distributed networks? Centred on a new media work of the same name by the Transmute Collective (led by Keith Armstrong), this book provides insights from multidisciplinary perspectives. Visual, sound and performance artists, furniture designers, spatial architects, technology systems designers, and curators who collaborated in the production of Intimate Transactions discuss their design philosophies, working processes and resolution of this major new media work. Analytical and philosophical essays by international writers complement these writings on production. They consider how new media art, like Intimate Transactions, challenges traditional understandings of art, curatorial installation and exhibition experience because of the need to take into account interaction, the reconfiguration of space, co-presence, performativity and inter-site collaboration.
Resumo:
This paper critiques our experiences as non-Indigenous Australian educators of working with numerous embedding Indigenous perspectives curricular projects at an Australian university. Reporting on these project outcomes alone, while useful in identifying limitations, does not illustrate ways in which future embedding and decolonising projects can persist and evolve. Deeper analysis is required of the ways in which Indigenous knowledge and perspectives are perceived, and what ‘embedding’ IK in university curricula truly means to various educational stakeholders. To achieve a deeper analysis and propose ways to invigorate the continuing decolonisation of Australian university curricula, this paper critically interrogates the methodology and conceptualisation of Indigenous knowledge in embedding Indigenous perspectives (EIP) in the university curriculum using tenets of critical race theory. Accordingly, we conduct this analysis from the standpoint that EIP should not subscribe to the luxury of independence of scholarship from politics and activism. The learning objective is to create a space to legitimise politics in the intellectual / academic realm (Dei, 2008, p. 10). We conclude by arguing that critical race theory’s emancipatory, future and action-oriented goals for curricula (Dei, 2008) would enhance effective and sustainable embedding initiatives, and ultimately, preventing such initiatives from returning to the status quo (McLaughlin & Whatman, 2008).