832 resultados para CONDUCTING SALTS
Resumo:
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
Resumo:
Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.
Resumo:
Through a forest inventory in parts of the Amudarya river delta, Central Asia, we assessed the impact of ongoing forest degradation on the emissions of greenhouse gases (GHG) from soils. Interpretation of aerial photographs from 2001, combined with data on forest inventory in 1990 and field survey in 2003 provided comprehensive information about the extent and changes of the natural tugai riparian forests and tree plantations in the delta. The findings show an average annual deforestation rate of almost 1.3% and an even higher rate of land use change from tugai forests to land with only sparse tree cover. These annual rates of deforestation and forest degradation are higher than the global annual forest loss. By 2003, the tugai forest area had drastically decreased to about 60% compared to an inventory in 1990. Significant differences in soil GHG emissions between forest and agricultural land use underscore the impact of the ongoing land use change on the emission of soil-borne GHGs. The conversion of tugai forests into irrigated croplands will release 2.5 t CO2 equivalents per hectare per year due to elevated emissions of N2O and CH4. This demonstrates that the ongoing transformation of tugai forests into agricultural land-use systems did not only lead to a loss of biodiversity and of a unique ecosystem, but substantially impacts the biosphere-atmosphere exchange of GHG and soil C and N turnover processes.
Resumo:
Organizations from every industry sector seek to enhance their business performance and competitiveness through the deployment of contemporary information systems (IS), such as Enterprise Systems (ERP). Investments in ERP are complex and costly, attracting scrutiny and pressure to justify their cost. Thus, IS researchers highlight the need for systematic evaluation of information system success, or impact, which has resulted in the introduction of varied models for evaluating information systems. One of these systematic measurement approaches is the IS-Impact Model introduced by a team of researchers at Queensland University of technology (QUT) (Gable, Sedera, & Chan, 2008). The IS-Impact Model is conceptualized as a formative, multidimensional index that consists of four dimensions. Gable et al. (2008) define IS-Impact as "a measure at a point in time, of the stream of net benefits from the IS, to date and anticipated, as perceived by all key-user-groups" (p.381). The IT Evaluation Research Program (ITE-Program) at QUT has grown the IS-Impact Research Track with the central goal of conducting further studies to enhance and extend the IS-Impact Model. The overall goal of the IS-Impact research track at QUT is "to develop the most widely employed model for benchmarking information systems in organizations for the joint benefit of both research and practice" (Gable, 2009). In order to achieve that, the IS-Impact research track advocates programmatic research having the principles of tenacity, holism, and generalizability through extension research strategies. This study was conducted within the IS-Impact Research Track, to further generalize the IS-Impact Model by extending it to the Saudi Arabian context. According to Hofsted (2012), the national culture of Saudi Arabia is significantly different from the Australian national culture making the Saudi Arabian culture an interesting context for testing the external validity of the IS-Impact Model. The study re-visits the IS-Impact Model from the ground up. Rather than assume the existing instrument is valid in the new context, or simply assess its validity through quantitative data collection, the study takes a qualitative, inductive approach to re-assessing the necessity and completeness of existing dimensions and measures. This is done in two phases: Exploratory Phase and Confirmatory Phase. The exploratory phase addresses the first research question of the study "Is the IS-Impact Model complete and able to capture the impact of information systems in Saudi Arabian Organization?". The content analysis, used to analyze the Identification Survey data, indicated that 2 of the 37 measures of the IS-Impact Model are not applicable for the Saudi Arabian Context. Moreover, no new measures or dimensions were identified, evidencing the completeness and content validity of the IS-Impact Model. In addition, the Identification Survey data suggested several concepts related to IS-Impact, the most prominent of which was "Computer Network Quality" (CNQ). The literature supported the existence of a theoretical link between IS-Impact and CNQ (CNQ is viewed as an antecedent of IS-Impact). With the primary goal of validating the IS-Impact model within its extended nomological network, CNQ was introduced to the research model. The Confirmatory Phase addresses the second research question of the study "Is the Extended IS-Impact Model Valid as a Hierarchical Multidimensional Formative Measurement Model?". The objective of the Confirmatory Phase was to test the validity of IS-Impact Model and CNQ Model. To achieve that, IS-Impact, CNQ, and IS-Satisfaction were operationalized in a survey instrument, and then the research model was assessed by employing the Partial Least Squares (PLS) approach. The CNQ model was validated as a formative model. Similarly, the IS-Impact Model was validated as a hierarchical multidimensional formative construct. However, the analysis indicated that one of the IS-Impact Model indicators was insignificant and can be removed from the model. Thus, the resulting Extended IS-Impact Model consists of 4 dimensions and 34 measures. Finally, the structural model was also assessed against two aspects: explanatory and predictive power. The analysis revealed that the path coefficient between CNQ and IS-Impact is significant with t-value= (4.826) and relatively strong with â = (0.426) with CNQ explaining 18% of the variance in IS-Impact. These results supported the hypothesis that CNQ is antecedent of IS-Impact. The study demonstrates that the quality of Computer Network affects the quality of the Enterprise System (ERP) and consequently the impacts of the system. Therefore, practitioners should pay attention to the Computer Network quality. Similarly, the path coefficient between IS-Impact and IS-Satisfaction was significant t-value = (17.79) and strong â = (0.744), with IS-Impact alone explaining 55% of the variance in Satisfaction, consistent with results of the original IS-Impact study (Gable et al., 2008). The research contributions include: (a) supporting the completeness and validity of IS-Impact Model as a Hierarchical Multi-dimensional Formative Measurement Model in the Saudi Arabian context, (b) operationalizing Computer Network Quality as conceptualized in the ITU-T Recommendation E.800 (ITU-T, 1993), (c) validating CNQ as a formative measurement model and as an antecedent of IS Impact, and (d) conceptualizing and validating IS-Satisfaction as a reflective measurement model and as an immediate consequence of IS Impact. The CNQ model provides a framework to perceptually measure Computer Network Quality from multiple perspectives. The CNQ model features an easy-to-understand, easy-to-use, and economical survey instrument.
Resumo:
There is a need for public health interventions to be based on the best available evidence. Unfortunately, well-conducted studies from settings similar to that in which an intervention is to be implemented are often not available. Therefore, health practitioners are forced to make judgements about proven effective interventions in one setting and their suitability to make a difference in their own setting. The framework of Wang et al. has been proposed to help with this process. This paper provides a case study on the application of the framework to a decision-making process regarding antenatal care in Aboriginal and Torres Strait Islander communities in Queensland. This method involved undertaking a systematic search of the current available evidence, then conducting a second literature search to determine factors that may affect the applicability and transferability of these interventions into these communities. Finally, in consideration of these factors, clinical judgement decisions on the applicability and transferability of these interventions were made. This method identified several interventions or strategies for which there was evidence of improving antenatal care or outcomes. By using the framework, we concluded that several of these effective interventions would be feasible in Aboriginal and Torres Strait Islander communities within Queensland.
Resumo:
This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.
Resumo:
This paper reports on the new literacy demands in the middle years of schooling project in which the affordances of placed-based pedagogy are being explored through teacher inquiries and classroom-based design experiments. The school is located within a large-scale urban renewal project in which houses are being demolished and families relocated. The original school buildings have recently been demolished and replaced by a large ‘superschool’ which serves a bigger student population from a wider area. Drawing on both quantitative and qualitative data, the teachers reported that the language literacy learning of students (including a majority of students learning English as a second language) involved in the project exceeded their expectations. The project provided the motivation for them to develop their oral language repertoires, by involving them in processes such as conducting interviews with adults for their oral histories, through questioning the project manager in regular meetings, and through reporting to their peers and the wider community at school assemblies. At the same time students’ written and multimodal documentation of changes in the neighbourhood and the school grounds extended their literate and semiotic repertoires as they produced books, reports, films, powerpoints, visual designs and models of structures.
Resumo:
Fourteen new complexes of the form cis-\[RuIIX2(R2qpy2+)2]4+ (R2qpy2+ = a 4,4′:2′,2″:4″,4‴-quaterpyridinium ligand, X = Cl− or NCS−) have been prepared and isolated as their PF6− salts. Characterisation involved various techniques including 1H NMR spectroscopy and +electrospray or MALDI mass spectrometry. The UV–Vis spectra display intense intraligand π → π∗ absorptions, and also metal-to-ligand charge-transfer (MLCT) bands with two resolved maxima in the visible region. Red-shifts in the MLCT bands occur as the electron-withdrawing strength of the pyridinium groups increases, while replacing Cl− with NCS− causes blue-shifts. Cyclic voltammograms show quasi-reversible or reversible RuIII/II oxidation waves, and several ligand-based reductions that are irreversible. The variations in the redox potentials correlate with changes in the MLCT energies. A single-crystal X-ray structure has been obtained for a protonated form of a proligand salt, \[(4-(CO2H)Ph)2qpyH3+]\[HSO4]3·3H2O. Time-dependent density functional theory calculations give adequate correlations with the experimental UV–Vis spectra for the two carboxylic acid-functionalised complexes in DMSO. Despite their attractive electronic absorption spectra, these dyes are relatively inefficient photosensitisers on electrodes coated with TiO2 or ZnO. These observations are attributed primarily to weak electronic coupling with the surfaces, since the DFT-derived LUMOs include no electron density near the carboxylic acid anchors.
Resumo:
A process for the preparation of a modified kaolin from a kaolin group mineral which includes expansion and contraction of layers of the kaolin group mineral. The layers comprising one Si-tetrahedral sheet and one Al-octahedral sheet. The expansion and contraction may be initiated by initial intercalation of a reagent which can penetrate kaolin layers to reach an interlayer region there between to form an intercalate. Subsequently, the intercalation may be followed by de-intercalation which involves the removal of the reagent. By the above process, there is provided crystalline modified kaolins having the following properties: (i) an increased interlayer space compared to corresponding kaolin group minerals; (ii) an increased susceptibility to intercalation by cations, anions or salts compared to corresponding kaolin group minerals; and (iii) an increased exfoliated morphology compared to corresponding kaolin group minerals.
Resumo:
Purpose – It is predicted that virtual business and related research possibilities will expand significantly. In this context, the aim of this paper is to use insights from a virtual research project to present a theoretically-informed toolbox of practical suggestions to guide the conduct of virtual world business research. Design/methodology/approach – Archival evidence is presented, and data from a study conducted in Second Lifew in 2007 is interpreted through Llewellyn’s framework (physical, structural, agential, cultural and mental dimensions). Findings – With the burgeoning of virtual business applications, appropriate systems that encompass the dynamics of both the real and the virtual will need to be developed by and for accountants, auditors and business professionals. Researchers of virtual business activities will need to adapt to the physical, structural, agential, cultural and mental dimensions unique to virtual worlds. Research limitations/implications – While based on reflections from a single study in Second Life, this paper identifies possibilities for future virtual research on issues of accountability and accounting relating to virtual worlds. Practical implications – The practical toolbox will assist virtual researchers to deal with the possibilities and practicalities of conducting research in virtual worlds. Originality/value – Despite the proliferation of virtual worlds, predictions of virtual business applications, and consequent accountability and accounting implications, there is a paucity of academic literature on conducting business research in virtual settings. This prescient paper develops a conceptual framework to guide the conduct of research in virtual worlds, and identifies the unique opportunities and challenges they present.
Resumo:
Qualitative Criminology: Stories from the Field brings to life the stories behind the research of both emerging and established scholars in Australian criminology. The book’s contributors provided honest, reflective, and decidedly unsanitised accounts of their qualitative research journeys - the lively tales of what really happens when conducting research of this nature, the stories that often make for parenthetical asides in conference papers but tend to be excised from journal articles. This book considers the gap between research methods and the realities of qualitative research. As such, it aims to help researchers and students who conduct qualitative criminological research reflect upon their role as researchers, and the practical, ideological and ethical issues which may arise in the course of their research. It is also a call to criminologists to make public the ‘failures’ and missteps of their research endeavours so that we can learn from one another and become better informed and more reflexive qualitative criminologists.
Resumo:
This paper provides a commentary on the contribution by Dr Chow who questioned whether the functions of learning are general across all categories of tasks or whether there are some task-particular aspects to the functions of learning in relation to task type. Specifically, they queried whether principles and practice for the acquisition of sport skills are different than what they are for musical, industrial, military and human factors skills. In this commentary we argue that ecological dynamics contains general principles of motor learning that can be instantiated in specific performance contexts to underpin learning design. In this proposal, we highlight the importance of conducting skill acquisition research in sport, rather than relying on empirical outcomes of research from a variety of different performance contexts. Here we discuss how task constraints of different performance contexts (sport, industry, military, music) provide different specific information sources that individuals use to couple their actions when performing and acquiring skills. We conclude by suggesting that his relationship between performance task constraints and learning processes might help explain the traditional emphasis on performance curves and performance outcomes to infer motor learning.
Resumo:
This paper explores Indigenous Australian women’s understanding of wellness, through the lens of social and emotional wellbeing. The authors use a “yarning” approach to explore how wellness is important to Indigenous women who live in North Brisbane (Australia). They discuss the benefits of yarning and its strength as a methodology for conducting research and building activism within Indigenous Australian communities. They argue that, for Indigenous Australian women, wellness is linked to a sense of wholeness and strongly related to the feeling of connection that women get from meeting together and having time for women’s business. They describe the way that their research project developed into a community summit focused on Indigenous women’s wellness.
Resumo:
The geology/reservoir program of the Queensland Geothermal Energy Centre of Excellence (QGECE) has the mission to improve the existing knowledge and develop new innovative scientific approaches for the identification of geothermal resources in Australia, with a particular focus on Queensland. Specifically, the QGECE geology/reservoir program is currently (1) producing a comprehensive geochemical dataset for high heat producing rocks, (2) conducting detailed mineralogical and geochronological studies of granites and hydrothermal alteration minerals, and ; (3) investigating the Cooper Basin representing a superb natural laboratory for understanding of radiogenic heat enrichment process and possible involvement of mantle heat flow. Seven research projects have been established, which are being conducted largely as PhD studies. In the preliminary studies, high quality and valuable results were obtained to address the research topics of understanding the causes and timing of heat producing element enrichment.
Resumo:
The Australian Institute of Criminology’s (AIC’s) national Juveniles in Detention Monitoring Program was established to contribute to the evidence base on juvenile detention in Australia, with a particular focus on Indigenous juveniles. Findings date back to 1981 and have been reported annually. This report provides an overview of the numbers and rates of juveniles in detention in Australia since 1981 and juveniles in detention for the financial year 2007–08. As with the AIC’s previous report on juveniles in detention (Taylor 2009), it also provides contextual information on young people sentenced in the children’s courts. The collation of data for these reports is supported by statutory juvenile justice agencies in each of Australia’s jurisdictions, as well as the NSW Department of Corrective Services. As described in more detail in this report, the Australian Institute of Health and Welfare (AIHW) administers the Juvenile Justice National Minimum Data Set and also reports annually on juveniles in detention. Given this development, the AIC is conducting a review of the Juveniles in Detention Monitoring Report in 2010–11, to ensure that AIC’s research and monitoring does not duplicate the AIHW’s work and that it makes a useful contribution to the field and enables more in-depth analysis of key issues.