934 resultados para lexicographical definition
Resumo:
This thesis provided a definition and conceptual framework for hospital disaster resilience; it used a mixed-method, including an empirical study in tertiary hospitals of Shandong Province in China, to devise an assessment instrument for measuring hospital resilience. The instrument is the first of its type and will allow hospitals to measure their resilience levels. The concept of disaster resilience has gained prominence in the light of the increased impact of various disasters. The notion of resilience encompasses the qualities that enable the organisation or community to resist, respond to, and recover from the impact of disasters. Hospital resilience is essential as it provides 'lifeline' services which minimize disaster impact. This thesis has provided a framework and instrument to evaluate the level of hospital resilience. Such an instrument could be used to better understand hospital resilience, and also as a decision-support tool for its promoting strategies and policies.
Resumo:
This thesis presents an empirical study of the effects of topology on cellular automata rule spaces. The classical definition of a cellular automaton is restricted to that of a regular lattice, often with periodic boundary conditions. This definition is extended to allow for arbitrary topologies. The dynamics of cellular automata within the triangular tessellation were analysed when transformed to 2-manifolds of topological genus 0, genus 1 and genus 2. Cellular automata dynamics were analysed from a statistical mechanics perspective. The sample sizes required to obtain accurate entropy calculations were determined by an entropy error analysis which observed the error in the computed entropy against increasing sample sizes. Each cellular automata rule space was sampled repeatedly and the selected cellular automata were simulated over many thousands of trials for each topology. This resulted in an entropy distribution for each rule space. The computed entropy distributions are indicative of the cellular automata dynamical class distribution. Through the comparison of these dynamical class distributions using the E-statistic, it was identified that such topological changes cause these distributions to alter. This is a significant result which implies that both global structure and local dynamics play a important role in defining long term behaviour of cellular automata.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
The Children’s Book Council of Australia (CBCA) administers the oldest national prize for children’s literature in Australia. Each year, the CBCA confers “Book of the Year” awards to literature for young people in five categories. In 2001, the establishment of an “Early Childhood” category opened up the venerable “Picture Book” category (first awarded in 1955) to books with an implied readership up to 18 years of age. As a result, this category has emerged in recent years as a highly visible space within which the CBCA can contest discourses of cultural marginalisation insofar as Australian (“colonial”) literature is constructed as inferior or adjunct to the major Anglophone literary traditions, and the consistent identification of children’s literature (and, indeed, of children) as lesser than its ‘adult’ counterparts. The CBCA is engaged in defining, evaluating, and legitimising a tradition of Australian children’s literature which is underpinned by a canonical impulse, and is a reflexive practice of self-definition, self-evaluation and self-legitimisation for the CBCA itself. While it is obviously problematic to identify award winners as a canon, it is equally obvious that literary prizing is a cultural practice derived from the logic of canonicity. In his discussion of the United States’s Newbery Medal, Kenneth Kidd notes that “Medal books are instant classics, the selection process an ostensible simulation of the test of time” (169) and that “the Medal is part of the canonical architecture of children's literature” (169). Thus, it is instructive to consider the visions and values of the national, of the social, and of the literary-aesthetic, in the picture books chosen by the Children’s Book Council of Australia (CBCA) as the “best” of the early twenty-first century. These books not only constitute a kind of canon for contemporary Australian children’s literature, but may well come to define what contemporary Australian children’s literature means in the wider literary field. The Book of the Year: Picture Book awards given by the CBCA since 2001 demonstrate that it is not only true of the Booker Prize that, “The choices of winning books reflect not only on the books themselves, then, but also back on the Prize, affecting its reputation and creating journalistic capital which is vital for the Prize to achieve its prominence and impact.” (81). Many of the twenty-first century CBCA award-winning picture books complicate traditional or comfortable understanding of Australianness, children’s literature, or “appropriate” modes of form and content, reminding us that “moments when texts resist or complicate recuperation into national discourses offer fruitful points for exploring the relationships between text and celebratory context” (Roberts 6). The CBCA has taken the opportunities offered by the liberation of the Picture Book category from an implied readership to challenge dominant constructions of children’s literature in Australia, and in so doing, are engaged in overt practices of canonicity with potentially long-lasting effects. Works Cited: Kidd, Kenneth. “Prizing Children’s Literature: The Case of Newbery Gold.” Children's Literature 35 (2007): 166-190. Roberts, Gillian. Prizing Literature: The Celebration and Circulation of National Culture. Toronto: U Toronto P, 2011. Squires, Claire. “Book Marketing and the Booker Prize.” Judging a Book by Its Cover: Fans, Publishers, Designers, and the Marketing of Fiction. Eds. Nicole Matthews and Nickianne Moody. Aldershot: Ashgate, 2007. 71-82.
Resumo:
A system is something that can be separated from its surrounds, but this definition leaves much scope for refinement. Starting with the notion of measurement, we explore increasingly contextual system behaviour, and identify three major forms of contextuality that might be exhibited by a system: (a) between components; (b) between system and experimental method, and; (c) between a system and its environment. Quantum Theory is shown to provide a highly useful formalism from which all three forms of contextuality can be analysed, offering numerous tests for contextual behaviour, as well as modelling possibilities for systems that do indeed display it. I conclude with the introduction of a Contextualised General Systems Theory based upon an extension of this formalism.
Resumo:
Germ cell mutagens are currently classified into three categories in the German List of MAK- and BAT-Values. These categories have been revised and extended in analogy to the new categories for carcinogenic chemicals. Germ cell mutagens produce heritable gene mutations, and heritable structural and numerical chromosome aberrations in germ cells. The original categories 1 and 2 for germ cell mutagens remained unchanged. Two new categories 3 A and 3 B are proposed for chemicals which are suspected to be germ cell mutagens. A new category 5 is proposed for germ cell mutagens with low potency which contribute negligibly to human genetic risk provided the MAK value is observed. The following categories are presented for further discussion. 1. Germ cell mutagens which have been shown to increase the mutant frequency among the progeny of exposed humans. 2. Germ cell mutagens which have been shown to increase the mutant frequency among the progeny of exposed animals. 3 A. Substances which have been shown to induce genetic damage in germ cells of humans or animals, or which are mutagenic in somatic cells and have been shown to reach the germ cells in their active forms. 3 B. Substances which are suspected of being germ cell mutagens because of their genotoxic effects in mammalian somatic cells in vivo or, in exceptional cases in the absence of in vivo data, if they are clearly mutagenic in vitro and structurally related to in vivo mutagens. 4. not applicable (Category 4 was introduced for carcinogenic substances with nongenotoxic modes of action. By definition, germ cell mutagens are genotoxic. Therefore, a Category 4 for germ cell mutagens cannot exist.) 5. Germ cell mutagens, the potency of which is considered to be so low that, provided the MAK value is observed, their contribution to genetic risk is expected not to be significant.
Resumo:
Background: The concept of palliative care consisting of five distinct, clinically meaningful, phases (stable, unstable, deteriorating, terminal and bereavement) was developed in Australia about 20 years ago and is used routinely for communicating clinical status, care planning, quality improvement and funding. Aim: To test the reliability and acceptability of revised definitions of Palliative Care Phase. Design: Multi-centre cross-sectional study involving pairs of clinicians independently rating patients according to revised definitions of Palliative Care Phase. Setting/participants: Clinicians from 10 Australian palliative care services, including 9 inpatient units and 1 mixed inpatient/community-based service. Results: A total of 102 nursing and medical clinicians participated, undertaking 595 paired assessments of 410 patients, of which 90.7% occurred within 2 h. Clinicians rated 54.8% of patients in the stable phase, 15.8% in the unstable phase, 20.8% in the deteriorating phase and 8.7% in the terminal phase. Overall agreement between clinicians’ rating of Palliative Care Phase was substantial (kappa = 0.67; 95% confidence interval = 0.61–0.70). A moderate level of inter-rater reliability was apparent across all participating sites. The results indicated that Palliative Care Phase was an acceptable measure, with no significant difficulties assigning patients to a Palliative Care Phase and a good fit between assessment of phase and the definition of that phase. The most difficult phase to distinguish from other phases was the deteriorating phase. Conclusion: Policy makers, funders and clinicians can be confident that Palliative Care Phase is a reliable and acceptable measure that can be used for care planning, quality improvement and funding purposes.
Resumo:
Background Impulsivity critically relates to many psychiatric disorders. Given the multifaceted construct that impulsivity represents, defining core aspects of impulsivity is vital for the assessment and understanding of clinical conditions. Choice impulsivity (CI), involving the preferential selection of smaller sooner rewards over larger later rewards, represents one important type of impulsivity. Method The International Society for Research on Impulsivity (InSRI) convened to discuss the definition and assessment of CI and provide recommendations regarding measurement across species. Results Commonly used preclinical and clinical CI behavioral tasks are described, and considerations for each task are provided to guide CI task selection. Differences in assessment of CI (self-report, behavioral) and calculating CI indices (e.g., area-under-the-curve, indifference point, steepness of discounting curve) are discussed along with properties of specific behavioral tasks used in preclinical and clinical settings. Conclusions The InSRI group recommends inclusion of measures of CI in human studies examining impulsivity. Animal studies examining impulsivity should also include assessments of CI and these measures should be harmonized in accordance with human studies of the disorders being modeled in the preclinical investigations. The choice of specific CI measures to be included should be based on the goals of the study and existing preclinical and clinical literature using established CI measures.
Resumo:
Entertainment is a key cultural category. Yet the definition of entertainment can differ depending upon whom one asks. This article maps out understandings of entertainment in three key areas. Within industrial discourses, entertainment is defined by a commercial business model. Within evaluative discourses used by consumers and critics, it is understood through an aesthetic system that privileges emotional engagement, story, speed and vulgarity. Within academia, entertainment has not been a key organizing concept within the humanities, despite the fact that it is one of the central categories used by producers and consumers of culture. It has been important within psychology, where entertainment is understood in a solipsistic sense as being anything that an individual finds entertaining. Synthesizing these approaches, the authors propose a cross-sectoral definition of entertainment as ‘audience-centred commercial culture’.
Resumo:
Purpose In the past, leadership scholars have tended to focus on leadership as a force for good and productivity (Ashworth, 1994; Higgs, 2009; Padilla, Hogan, & Kaiser, 2007). However, recently attention has been given to the ‘dark side’ of leadership (see Higgs, 2009; Judge, Piccolo, & Kosalka, 2009). The aim of this chapter is to explore dark leadership from the perspective of the narcissistic leader using a fictional character from a popular film. Methodology/approach Using the Diagnostic and Statistical Manual of Mental Disorders, 4th edition, 1994 (DSM-IV) (American Psychiatric Association, 2000) as an operational definition of narcissistic personality disorder we explore the psychology of the narcissistic leader through a fictional character study in a popular film. Findings We have created a psychological profile of a narcissistic leader which identifies specific behavioural characteristics within a toxic organizational culture. Social implications This study has implications for employees within any organizational culture. It is significant because it can illustrate how dark leadership can impact negatively within organizations. Originality/value The use of actual living persons on which to base case study material in the study of dark leadership is problematic and constrained by ethical issues. However, the use of characters in fiction, such as contemporary film and drama, represents an excellent source of case study material. Given that little empirical works exists on narcissistic leaders and leadership, the chapter adds originality and value to the field.
Resumo:
For Construction - Architectural drawing package. House designed to AS3959:2009 Bushfire Attack Level 40. QUT-Client Agreement 100% Research (HERDC definition of Research).
Resumo:
Construction drawings for Built work of Architecture. Completed July 2013. House designed to AS3959:2009 Bushfire Attack Level 40. 100% Commercial Research Project (HERDC Definition of Research)
Resumo:
Abnormal event detection has attracted a lot of attention in the computer vision research community during recent years due to the increased focus on automated surveillance systems to improve security in public places. Due to the scarcity of training data and the definition of an abnormality being dependent on context, abnormal event detection is generally formulated as a data-driven approach where activities are modeled in an unsupervised fashion during the training phase. In this work, we use a Gaussian mixture model (GMM) to cluster the activities during the training phase, and propose a Gaussian mixture model based Markov random field (GMM-MRF) to estimate the likelihood scores of new videos in the testing phase. Further-more, we propose two new features: optical acceleration, and the histogram of optical flow gradients; to detect the presence of any abnormal objects and speed violations in the scene. We show that our proposed method outperforms other state of the art abnormal event detection algorithms on publicly available UCSD dataset.
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Resumo:
1.Marine ecosystems provide critically important goods and services to society, and hence their accelerated degradation underpins an urgent need to take rapid, ambitious and informed decisions regarding their conservation and management. 2.The capacity, however, to generate the detailed field data required to inform conservation planning at appropriate scales is limited by time and resource consuming methods for collecting and analysing field data at the large scales required. 3.The ‘Catlin Seaview Survey’, described here, introduces a novel framework for large-scale monitoring of coral reefs using high-definition underwater imagery collected using customized underwater vehicles in combination with computer vision and machine learning. This enables quantitative and geo-referenced outputs of coral reef features such as habitat types, benthic composition, and structural complexity (rugosity) to be generated across multiple kilometre-scale transects with a spatial resolution ranging from 2 to 6 m2. 4.The novel application of technology described here has enormous potential to contribute to our understanding of coral reefs and associated impacts by underpinning management decisions with kilometre-scale measurements of reef health. 5.Imagery datasets from an initial survey of 500 km of seascape are freely available through an online tool called the Catlin Global Reef Record. Outputs from the image analysis using the technologies described here will be updated on the online repository as work progresses on each dataset. 6.Case studies illustrate the utility of outputs as well as their potential to link to information from remote sensing. The potential implications of the innovative technologies on marine resource management and conservation are also discussed, along with the accuracy and efficiency of the methodologies deployed.