996 resultados para Engineering law


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most recommender systems attempt to use collaborative filtering, content-based filtering or hybrid approach to recommend items to new users. Collaborative filtering recommends items to new users based on their similar neighbours, and content-based filtering approach tries to recommend items that are similar to new users' profiles. The fundamental issues include how to profile new users, and how to deal with the over-specialization in content-based recommender systems. Indeed, the terms used to describe items can be formed as a concept hierarchy. Therefore, we aim to describe user profiles or information needs by using concepts vectors. This paper presents a new method to acquire user information needs, which allows new users to describe their preferences on a concept hierarchy rather than rating items. It also develops a new ranking function to recommend items to new users based on their information needs. The proposed approach is evaluated on Amazon book datasets. The experimental results demonstrate that the proposed approach can largely improve the effectiveness of recommender systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Different reputation models are used in the web in order to generate reputation values for products using uses' review data. Most of the current reputation models use review ratings and neglect users' textual reviews, because it is more difficult to process. However, we argue that the overall reputation score for an item does not reflect the actual reputation for all of its features. And that's why the use of users' textual reviews is necessary. In our work we introduce a new reputation model that defines a new aggregation method for users' extracted opinions about products' features from users' text. Our model uses features ontology in order to define general features and sub-features of a product. It also reflects the frequencies of positive and negative opinions. We provide a case study to show how our results compare with other reputation models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research was commissioned by Metecno Pty Ltd, trading as Bondor®. The InsulLiving house was designed and constructed by Bondor®. The house instrumentation (electricity circuits, indoor environment, weather station) was provided by Bondor and supplied and installed by independent contractors. This report contains analysis of data collected from the InsulLiving house at Burpengary during 1 year of occupancy by a family of four for the period 1 April 2012 – 31 March 2013. The data shows a daily average electricity consumption 48% less than the regional average. The analysis confirms that the 9 star house performed thermally slightly better than the simulated performance. The home was 'near zero energy', with its modest 2.1kW solar power system meeting all of the needs for space heating and cooling, lighting and most water heating.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND Research on engineering design is a core area of concern within engineering education and a fundamental understanding of how engineering students approach and undertake design is necessary in order to develop effective design models and pedagogies. Understanding the factors related to design experiences in education and how they affect student practice can help educators as well as designers to leverage these factors as part of the design process. PURPOSE This study investigated the design practices of first-year engineering students’ and their experiences with a first-year engineering course design project. The research questions that guided the investigation were: 1. From a student perspective, what design parameters or criteria are most important? 2. How does this perspective impact subsequent student design practice throughout the design process? DESIGN/METHOD The authors employed qualitative multi-case study methods (Miles & Huberman, 1994) in order to the answer the research questions. Participant teams were observed and video recorded during team design meetings in which they researched the background for the design problem, brainstormed and sketched possible solutions, as well as built prototypes and final models of their design solutions as part of a course design project. Analysis focused on explanation building (Yin, 2009) and utilized within-case and cross-case analysis (Miles & Huberman, 1994). RESULTS We found that students focused disproportionally on the functional parameter, i.e. the physical implementation of their solution, and the possible/applicable parameter, i.e. a possible and applicable solution that benefited the user, in comparison to other given parameters such as safety and innovativeness. In addition, we found that individual teams focused on the functional and possible/ applicable parameters in early design phases such as brainstorming/ ideation and sketching. When prompted to discuss these non-salient parameters (from the student perspective) in the final design report, student design teams often used a post-hoc justification to support how the final designs fit the parameters that they did not initially consider. CONCLUSIONS This study suggests is that student design teams become fixated on (and consequently prioritize) certain parameters they interpret as important because they feel these parameters were described more explicitly in terms how they were met and assessed. Students fail to consider other parameters, perceived to be less directly assessable, unless prompted to do so. Failure to consider other parameters in the early design phases subsequently affects their approach in design phases as well. Case studies examining students’ study strategies within three Australian Universities illustrate similarities with some student approaches to design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Fully updated to reflect the rapid pace of change in the health law areas. Explains the legal process as it relates to the health care professional."--Libraries Australia. Table of Contents Part I. Introductory concepts -- 1. What is law -- 2. The legal structure -- 3. The legal process -- Part II. Patient relationships -- 4. Consent to health care by a competent adult -- 5. Consent to health care by a legally incompetent person -- 6. Negligence -- 7. Patient information and privacy -- 8. Patients' property -- 9. Contract -- Part III. Employment -- 10. Contracts to provide health care services -- 011. Accidents and injuries related to health care --12. Registration and practice --13. Drugs --14. Criminal law and health care --15. State involvement in birth and death: registration and coronial inquiries --16. State involvement in threats to health or welfare --17. Human tissue transplants and reproductive technology --18. Expanding recognition of human rights --19. Decision making, law and ethics: a discussion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Joint venture design teams are formed to combine resources and expertise in order to secure multi-discipline engineering design services on major projects. Bringing together resources from two ordinarily competing companies to form one joint team is however challenging as each parent company brings to the project its own organisational culture, processes and team attitudes. This study examined the factors that impact on forming a successful joint venture project team. Three critical areas were identified from an extensive literature review; Joint Venture Arrangements, Parent Companies and Forming the Team; and a survey was conducted with professionals who have worked in joint venture project teams in the Australian building industry in order to identify factors that affected successful joint venture team formation, and the common lessons learnt. This study reinforced the importance of three key criteria - trust, commitment and compatibility - for partner alignment. The results also identified four key lessons learnt which included; selecting the right resources, enabling a collaborative working environment by way of project office, implementing an independent Joint Venture Manager, and allocating work which is best for project with fees reflecting risk where risk is disproportionate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nanomaterials are prone to influence by chemical adsorption because of their large surface to volume ratios. This enables sensitive detection of adsorbed chemical species which, in turn, can tune the property of the host material. Recent studies discovered that single and multi-layer molybdenum disulfide (MoS2) films are ultra-sensitive to several important environmental molecules. Here we report new findings from ab inito calculations that reveal substantially enhanced adsorption of NO and NH3 on strained monolayer MoS2 with significant impact on the properties of the adsorbates and the MoS2 layer. The magnetic moment of adsorbed NO can be tuned between 0 and 1 μB; strain also induces an electronic phase transition between half-metal and metal. Adsorption of NH3 weakens the MoS2 layer considerably, which explains the large discrepancy between the experimentally measured strength and breaking strain of MoS2 films and previous theoretical predictions. On the other hand, adsorption of NO2, CO, and CO2 is insensitive to the strain condition in the MoS2 layer. This contrasting behavior allows sensitive strain engineering of selective chemical adsorption on MoS2 with effective tuning of mechanical, electronic, and magnetic properties. These results suggest new design strategies for constructing MoS2-based ultrahigh-sensitivity nanoscale sensors and electromechanical devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Against the advice of their own parliamentary committees, and despite the experience of other jurisdictions, both the Government and Opposition parties seem to be intent on outbidding each other on mandatory sentencing regimes in the lead-up to the 2003 NSW election, says DAVID BROWN.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In our rejoinder to Don Weatherburn's paper, “Law and Order Blues”, we do not take issue with his advocacy of the need to take crime seriously and to foster a more rational approach to the problems it poses. Where differences do emerge is (1) with his claim that he is willing to do so whilst we (in our different ways) are not; and (2) on the question of what this involves. Of particular concern is the way in which his argument proceeds by a combination of simple misrepresentation of the positions it seeks to disparage, and silence concerning issues of real substance where intellectual debate and exchange would be welcome and useful. Our paper challenges, in turn, the misrepresentation of Indermaur's analysis of trends in violent crime, the misrepresentation of Hogg and Brown's Rethinking Law and Order, the misrepresentation of the findings of some of the research into the effectiveness of punitive policies and the silence on sexual assault in “Law and Order Blues”. We suggest that his silence on sexual assault reflects a more widespread unwillingness to acknowledge the methodological problems that arise in the measurement of crime because such problems severely limit the extent to which confident assertions can be made about prevalence and trends.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research identifies factors that are crucial to the success of a knowledge management system (KMS) implementation in a prominent Australian engineering consultancy firm. The study employs the Delphi method to solicit the opinions of experienced market leaders in the Australian construction industry, and then benchmarks the organisational profile of the consultancy firm against the Delphi findings. From this comparative case study, recommendations are made pertaining to the organisational and cultural changes required within the consultancy firm in order to improve its readiness to successfully implement a KMS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Like many cautionary tales, The Hunger Games takes as its major premise an observation about contemporary society, measuring its ballistic arc in order to present graphically its logical conclusions. The Hunger Games gazes back to the panem et circenses of Ancient Rome, staring equally cynically forward, following the trajectory of reality television to its unbearably barbaric end point – a sadistic voyeurism for an effete elite of consumers. At each end of the historical spectrum (and in the present), the prevailing social form is Arendt’s animal laborans. Consumer or consumed, Panem’s population is (with the exception of the inner circle) either deprived of the possibility of, or distracted from, political action. Within the confines of the Games themselves, Law is abandoned or de‐realised: Law – an elided Other in the pseudo‐Hobbesian nightmare that is the Arena. The Games are played out, as were gladiatorial combats and other diversions of the Roman Empire, against a background resonant of Juvenal’s concern for his contemporaries’ attachment to short term gratification at the expense the civic virtues of justice and caring which are (or would be) constitutive of a contemporary form of Arendt’s homo politicus. While the Games are, on their face, ‘reality’ they are (like the realities presented in contemporary reality television) a simulated reality, de‐realised in a Foucauldian set design constructed as a distraction for Capitol, and for the residents of the Districts, a constant reminder of their subservience to Capitol. Yet contemporary Western culture, for which manipulative reality TV is but a symptom of an underlying malaise, is inscribed at least as an incipient Panem, Its public/political space is diminished by the effective slavery of the poor, the pre‐occupation with and distractions of materiality and modern media, and the increasing concentration of power/wealth into a smaller proportion of the population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Taxation law can be an incredibly complex subject to absorb, particularly when time is limited. Written specifically for students, Principles of Taxation Law 2014 brings much needed clarity to this area of law. Utilising many methods to make this often daunting subject achievable, particular features of the 2014 edition include: seven parts: overview and structure, principles of income, deductions and offsets, timing issues, investment and business entities, tax avoidance and administration, and indirect taxes; clearly structured chapters within those parts grouped under helpful headings;flowcharts, diagrams and tables, end of chapter practice questions, and case summaries; an appendix containing all of the up to date and relevant rates; and the online self-testing component mentor, which provides questions for students of both business and law. Every major aspect of the Australian tax system is covered, with chapters on topics such as goods and services tax, superannuation, offsets, partnerships, capital gains tax, trusts, company tax and tax administration.All chapters have been thoroughly revised"-- Publishers website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"The success of Criminal Laws lies both in its distinctive features and in its appeal to a range of readerships. As one review put it, it is simultaneously a "textbook, casebook, handbook and reference work". As such it is ideal for criminal law and criminal justice courses as a teaching text, combining as it does primary sources with extensive critical commentary and a contextual perspective. It is likewise indispensable to practitioners for its detailed coverage of substantive law and its extensive references and inter-disciplinary approach make it a first point of call for researchers from all disciplines. This fifth edition strengthens these distinctive features. All chapters have been systematically updated to incorporate the plethora of legislative, case law, statistical and research material which has emerged since the previous edition. The critical, thematic, contextual and interdisciplinary perspectives have been continued."--Publisher's website. Table of Contents: 1. Some themes -- 2. Criminalisation -- 3. The criminal process -- 4. Components of criminal offences -- 5. Homicide: murder and involuntary manslaughter -- 6. Defences -- 7. Assault and sexual assault -- 8. Public order offences -- 9. Drugs offences -- 10. Dishonest acquisition -- 11. Extending criminal liability: complicity, conspiracy and association -- 12. Sentencing and penality.