967 resultados para MARC format


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dhaka, which is the capital of Bangladesh, is facing serious traffic congestion and whole traffic situation in Dhaka is in chaos. Government has initiated some projects; such as BRT, MRT and elevated expressway; to improve the situation. Road pricing is very popular concept, which can be implemented in Dhaka with BRT and MRT as an integrated manner. Even though it is very popular concept not many countries except some developed countries implemented road pricing practically. None of the developing countries adopted this policy. For success of road pricing it has to be acceptable among the stakeholders. Public are the main stakeholders for road pricing. This paper will explore whether road pricing will be acceptable in Dhaka considering only work trip in Dhaka. A sample of workers had been surveyed randomly. They were asked some demographic questions, such as age, gender, income and educational qualification; how they travelled to work; and whether they would accept road pricing; and if they would not accept road pricing the reasons behind that. Also respondents were given several hypothetical choices to see how respondents react with different road charge by choosing travel mode for their work trip. The methodological approach taken for analysis is qualitative and quantitative analysis. For quantitative analysis Binary Logit Regression analysis was carried out to find out the significant factors for accepting or not accepting road pricing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

miRDeep and its varieties are widely used to quantify known and novel micro RNA (miRNA) from small RNA sequencing (RNAseq). This article describes miRDeep*, our integrated miRNA identification tool, which is modeled off miRDeep, but the precision of detecting novel miRNAs is improved by introducing new strategies to identify precursor miRNAs. miRDeep* has a user-friendly graphic interface and accepts raw data in FastQ and Sequence Alignment Map (SAM) or the binary equivalent (BAM) format. Known and novel miRNA expression levels, as measured by the number of reads, are displayed in an interface, which shows each RNAseq read relative to the pre-miRNA hairpin. The secondary pre-miRNA structure and read locations for each predicted miRNA are shown and kept in a separate figure file. Moreover, the target genes of known and novel miRNAs are predicted using the TargetScan algorithm, and the targets are ranked according to the confidence score. miRDeep* is an integrated standalone application where sequence alignment, pre-miRNA secondary structure calculation and graphical display are purely Java coded. This application tool can be executed using a normal personal computer with 1.5 GB of memory. Further, we show that miRDeep* outperformed existing miRNA prediction tools using our LNCaP and other small RNAseq datasets. miRDeep* is freely available online at http://www.australianprostatecentre.org/research/software/mirdeep-star

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Gallery of Modern Art (GoMA) in Brisbane, Australia’s third largest city, recently staged ‘21st Century: Art of the First Decade’. The gallery spaces were replete with a commissioned slide by Carsten Höller, an installation of Rivane Neuenschwande’s I Wish Your Wish (2003), a table of white Legos, a room of purple balloons and other participatory or interactive artworks designed to engage multiple publics and encourage audience participation in a variety of ways. Many of the featured projects used day-to-day experiences and offered new conceptions about art practice and what they can elicit in their public – raise awareness about local issues, help audiences imagine different ways of negotiating their environs or experi-ence a museum in a new way. At times, the bottom floor galleries resembled a theme park – adults and children playing with Legos and using Höller’s slide. This article examines the benefits and limitations of such artistic interventions by relating the GoMA exhibition to Brisbane City Council’s campaign of ‘Together Brisbane’ (featuring images of Neunenschwande’s ribbons); a response to the devastation brought to the city and its surrounds in January 2011. During the Brisbane floods, GoMA’s basement was damaged, the museum closed and upon reopening, visitor numbers soared. In this context, GoMA’s use of engaged art practice – always verging on the ephemeral and ‘fun’ – has been used to project a wider notion of a collective urban public. What questions does this raise, not only regarding the cultural politics around the social and participatory ‘turn’ in art practice, but its use to address a much wider urban public in a moment of crisis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RESEARCH BACKGROUND Enacted Cartography documents 10 years of creative research practice by Ian Weir Research Architect and was developed as standalone exhibition to support Dr Weir’s selection by the Australian Institute of Architects to represent innovative architectural practice via the Institute’s review entitled Formations: New Practices in Australian Architecture – which took the form of an exhibition and book presented in Venice, Italy for 13th International Architecture Exhibition (Venice Architecture Biennale). All works exhibited in Enacted Cartography are original works by Dr Weir and are generated either from or for the remote biodiverse landscapes of the Fitzgerald Bioregion on the south coast of Western Australia. RESEARCH CONTRIBUTION As a creative work in its own right, the Enacted Cartography exhibition makes the following contributions to knowledge: 1. Expands understandings of architectural practice by presenting a geographically-specific but multimodal form of architectural practice - wherein practitioners cross over discipline boundaries into art practice, landscape representation, website design, undergraduate university teaching and community advocacy. 2. Contributes to understandings of how such a diverse multimodal form of practice might be represented through both digital media and traditional print media in an exhibition format. 3. Expands understandings of how architectural practitioners might work within a particular place to develop a geographically-specific sense of identity, a ‘landscape of resistance’. RESEARCH SIGNIFICANCE Enacted Cartography was presented to an international audience during the 13th International Architecture Exhibition (Venice Architecture Biennale). The significance of Dr Weir’s research is evidence by his selected by the Australian Institute of Architects to represent innovation in architectural practice for the Biennale. Enacted Cartography addresses problems of national and international importance including: 1. The sustainable development of biodiverse remote landscapes; 2. The reconciliation of bushfire safety and biodiversity conservation; 3. The necessity for rethinking of architectural design methodologies to meet the complexity of landscape management and design; 4. It challenges orthodox forms of landscape representation (aerial photography, for example) which are demonstrably inadequate registrations of biophysical and cultural landscapes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

QUT’s new metadata repository (data registry), Research Data Finder, has been designed to promote the visibility and discoverability of QUT research datasets. Funded by the Australian National Data Service (ANDS), it will provide a qualitative snapshot of research data outputs created or collected by members of the QUT research community that are available via open or mediated access. As a fully integrated metadata repository Research Data Finder aligns with institutional sources of truth, such as QUT’s research administrative system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. In addition, the repository and its workflows are designed to foster smoother data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximize existing research datasets. The metadata schema used in Research Data Finder is the Registry Interchange Format - Collections and Services (RIF-CS), developed by ANDS in 2009. This comprehensive schema is potentially complex for researchers; unlike metadata for publications, which are often made publicly available with the official publication, metadata for datasets are not typically available and need to be created. Research Data Finder uses a hybrid self-deposit and mediated deposit system. In addition to automated ingests from ResearchMaster (research project information) and Academic Profiles system (researcher information), shareable data is identified at a number of key “trigger points” in the research cycle. These include: research grant proposals; ethics applications; Data Management Plans; Liaison Librarian data interviews; and thesis submissions. These ingested records can be supplemented with related metadata including links to related publications, such as those in QUT ePrints. Records deposited in Research Data Finder are harvested by ANDS and made available to a national and international audience via Research Data Australia, ANDS’ discovery service for Australian research data. Researcher and research group metadata records are also harvested by the National Library of Australia (NLA) and these records are then published in Trove (the NLA’s digital information portal). By contributing records to the national infrastructure, QUT data will become more visible. Within Australia and internationally, many funding bodies have already mandated the open access of publications produced from publicly funded research projects, such as those supported by the Australian Research Council (ARC), or the National Health and Medical Research Council (NHMRC). QUT will be well placed to respond to the rapidly evolving climate of research data management. This project is supported by the Australian National Data Service (ANDS). ANDS is supported by the Australian Government through the National Collaborative Research Infrastructure Strategy Program and the Education Investment Fund (EIF) Super Science Initiative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital storytelling projects have proliferated in Australia since the early 2000s, and have been theorized as a means to disseminate the stories and voices of “ordinary” people. In this paper I examine through the case study of a 2009 digital storytelling project between the Australasian Centre for Interactive Design and a group identifying as Forgotten Australian whether digital storytelling in its predominant workshop-based format is able to meet the needs of profoundly marginalized and traumatized individuals and groups. For digital storytelling to be of use to marginalized groups as a means of communication or reflection a significant re-examination of the current approaches to its format, and its function needs to undertaken. This paper posits new ways of utilizing digital storytelling when dealing with trauma narratives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

excerpt: from soil and stone is a work consisting of fifty drawings on paper organised in a grid. Each drawing is small, only 19 by 14 centimetres, and set out in portrait format. They each reference, either explicitly or abstractly, natural phenomena. These include plant forms, pollens, seeds, pods, and leaf shapes and each is painted with a dizzying and liquid array of techniques and technical finesse. Colour is used sparingly but tellingly, and all are generously and wetly composed, with each seeming to flow into the necessary rightness of composition. Within the overall work the feel is sometimes of the archive, a personal kind where pressed flowers are stumbled upon within a book. At other times they seem to image the stellar as one confronts the immensity of some planet suspended in the void. Again, as a recurring theme in Reynolds’ oeuvre, the notion of the taxonomy is sounded. The drawings are laid out to display difference and reveal through contrast essence. It is a mapping that illuminates a generous plentitude.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the evaluation, design, and planning of traffic facilities and measures, traffic simulation packages are the de facto tools for consultants, policy makers, and researchers. However, the available commercial simulation packages do not always offer the desired work flow and flexibility for academic research. In many cases, researchers resort to designing and building their own dedicated models, without an intrinsic incentive (or the practical means) to make the results available in the public domain. To make matters worse, a substantial part of these efforts pertains to rebuilding basic functionality and, in many respects, reinventing the wheel. This problem not only affects the research community but adversely affects the entire traffic simulation community and frustrates the development of traffic simulation in general. For this problem to be addressed, this paper describes an open source approach, OpenTraffic, which is being developed as a collaborative effort between the Queensland University of Technology, Australia; the National Institute of Informatics, Tokyo; and the Technical University of Delft, the Netherlands. The OpenTraffic simulation framework enables academies from geographic areas and disciplines within the traffic domain to work together and contribute to a specific topic of interest, ranging from travel choice behavior to car following, and from response to intelligent transportation systems to activity planning. The modular approach enables users of the software to focus on their area of interest, whereas other functional modules can be regarded as black boxes. Specific attention is paid to a standardization of data inputs and outputs for traffic simulations. Such standardization will allow the sharing of data with many existing commercial simulation packages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Non-fatal health outcomes from diseases and injuries are a crucial consideration in the promotion and monitoring of individual and population health. The Global Burden of Disease (GBD) studies done in 1990 and 2000 have been the only studies to quantify non-fatal health outcomes across an exhaustive set of disorders at the global and regional level. Neither effort quantified uncertainty in prevalence or years lived with disability (YLDs). Methods Of the 291 diseases and injuries in the GBD cause list, 289 cause disability. For 1160 sequelae of the 289 diseases and injuries, we undertook a systematic analysis of prevalence, incidence, remission, duration, and excess mortality. Sources included published studies, case notification, population-based cancer registries, other disease registries, antenatal clinic serosurveillance, hospital discharge data, ambulatory care data, household surveys, other surveys, and cohort studies. For most sequelae, we used a Bayesian meta-regression method, DisMod-MR, designed to address key limitations in descriptive epidemiological data, including missing data, inconsistency, and large methodological variation between data sources. For some disorders, we used natural history models, geospatial models, back-calculation models (models calculating incidence from population mortality rates and case fatality), or registration completeness models (models adjusting for incomplete registration with health-system access and other covariates). Disability weights for 220 unique health states were used to capture the severity of health loss. YLDs by cause at age, sex, country, and year levels were adjusted for comorbidity with simulation methods. We included uncertainty estimates at all stages of the analysis. Findings Global prevalence for all ages combined in 2010 across the 1160 sequelae ranged from fewer than one case per 1 million people to 350 000 cases per 1 million people. Prevalence and severity of health loss were weakly correlated (correlation coefficient −0·37). In 2010, there were 777 million YLDs from all causes, up from 583 million in 1990. The main contributors to global YLDs were mental and behavioural disorders, musculoskeletal disorders, and diabetes or endocrine diseases. The leading specific causes of YLDs were much the same in 2010 as they were in 1990: low back pain, major depressive disorder, iron-deficiency anaemia, neck pain, chronic obstructive pulmonary disease, anxiety disorders, migraine, diabetes, and falls. Age-specific prevalence of YLDs increased with age in all regions and has decreased slightly from 1990 to 2010. Regional patterns of the leading causes of YLDs were more similar compared with years of life lost due to premature mortality. Neglected tropical diseases, HIV/AIDS, tuberculosis, malaria, and anaemia were important causes of YLDs in sub-Saharan Africa. Interpretation Rates of YLDs per 100 000 people have remained largely constant over time but rise steadily with age. Population growth and ageing have increased YLD numbers and crude rates over the past two decades. Prevalences of the most common causes of YLDs, such as mental and behavioural disorders and musculoskeletal disorders, have not decreased. Health systems will need to address the needs of the rising numbers of individuals with a range of disorders that largely cause disability but not mortality. Quantification of the burden of non-fatal health outcomes will be crucial to understand how well health systems are responding to these challenges. Effective and affordable strategies to deal with this rising burden are an urgent priority for health systems in most parts of the world. Funding Bill & Melinda Gates Foundation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Encompasses the whole BPM lifecycle, including process identification, modelling, analysis, redesign, automation and monitoring Class-tested textbook complemented with additional teaching material on the accompanying website Covers both relevant conceptual background, industrial standards and actionable skills Business Process Management (BPM) is the art and science of how work should be performed in an organization in order to ensure consistent outputs and to take advantage of improvement opportunities, e.g. reducing costs, execution times or error rates. Importantly, BPM is not about improving the way individual activities are performed, but rather about managing entire chains of events, activities and decisions that ultimately produce added value for an organization and its customers. This textbook encompasses the entire BPM lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-disciplinary approach. The presentation is illustrated using the BPMN industry standard defined by the Object Management Group and widely endorsed by practitioners and vendors worldwide. In addition to explaining the relevant conceptual background, the book provides dozens of examples, more than 100 hands-on exercises – many with solutions – as well as numerous suggestions for further reading. The textbook is the result of many years of combined teaching experience of the authors, both at the undergraduate and graduate levels as well as in the context of professional training. Students and professionals from both business management and computer science will benefit from the step-by-step style of the textbook and its focus on fundamental concepts and proven methods. Lecturers will appreciate the class-tested format and the additional teaching material available on the accompanying website fundamentals-of-bpm.org.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examined the effects of post-exercise cooling on recovery of neuromuscular, physiological, and cerebral hemodynamic responses after intermittent-sprint exercise in the heat. Nine participants underwent three post-exercise recovery trials, including a control (CONT), mixed-method cooling (MIX), and cold-water immersion (10 °C; CWI). Voluntary force and activation were assessed simultaneously with cerebral oxygenation (near-infrared spectroscopy) pre- and post-exercise, post-intervention, and 1-h and 24-h post-exercise. Measures of heart rate, core temperature, skin temperature, muscle damage, and inflammation were also collected. Both cooling interventions reduced heart rate, core, and skin temperature post-intervention (P < 0.05). CWI hastened the recovery of voluntary force by 12.7 ± 11.7% (mean ± SD) and 16.3 ± 10.5% 1-h post-exercise compared to MIX and CONT, respectively (P < 0.01). Voluntary force remained elevated by 16.1 ± 20.5% 24-h post-exercise after CWI compared to CONT (P < 0.05). Central activation was increased post-intervention and 1-h post-exercise with CWI compared to CONT (P < 0.05), without differences between conditions 24-h post-exercise (P > 0.05). CWI reduced cerebral oxygenation compared to MIX and CONT post-intervention (P < 0.01). Furthermore, cooling interventions reduced cortisol 1-h post-exercise (P < 0.01), although only CWI blunted creatine kinase 24-h post-exercise compared to CONT (P < 0.05). Accordingly, improvements in neuromuscular recovery after post-exercise cooling appear to be disassociated with cerebral oxygenation, rather reflecting reductions in thermoregulatory demands to sustain force production.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the role of principal leadership in creating a thinking school. It contributes to the school leadership literature by exploring the intersection of two important areas of study in education - school leadership and education for thinking - which is a particularly apt area of study, because effective school leadership is crucial if students are to learn to be critical and creative thinkers, yet this connection has not be widely investigated. We describe how one principal, Hinton, turned around an underperforming school by using critical and creative philosophical thinking as the focus for students, staff and parents. Then, drawing on the school leadership literature, the article describes seven attributes of school leadership beginning with four articulated by Leithwood and colleagues (2006) (building vision and setting direction; redesigning the organisation; understanding and developing people; managing the teaching and learning program), and adding three others (influence; self-development; and responding to context). This framework is then used in a case study format in a collaboration between practitioner and researchers to first explore evidence from empirical studies and personal reflection about Hinton's leadership of Buranda State School, and second to illuminate how these general features of school leadership apply to creating a thinking school. Based on the case study and using the general characteristics of school leadership, a framework for leading a thinking school is described. Because the framework is based on a turnaround school, this framework has wide applicability: to schools that are doing well as an indication of how to implement a contemporary approach to curriculum and pedagogy; and to schools that are underperforming and want a rigorous, high expectation and contemporary way to improve student learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On August 16, 2012 the SIGIR 2012 Workshop on Open Source Information Retrieval was held as part of the SIGIR 2012 conference in Portland, Oregon, USA. There were 2 invited talks, one from industry and one from academia. There were 6 full papers and 6 short papers presented as well as demonstrations of 4 open source tools. Finally there was a lively discussion on future directions for the open source Information Retrieval community. This contribution discusses the events of the workshop and outlines future directions for the community.