886 resultados para Shift-share analysis
Resumo:
Recent literature has argued that environmental efficiency (EE), which is built on the materials balance (MB) principle, is more suitable than other EE measures in situations where the law of mass conversation regulates production processes. In addition, the MB-based EE method is particularly useful in analysing possible trade-offs between cost and environmental performance. Identifying determinants of MB-based EE can provide useful information to decision makers but there are very few empirical investigations into this issue. This article proposes the use of data envelopment analysis and stochastic frontier analysis techniques to analyse variation in MB-based EE. Specifically, the article develops a stochastic nutrient frontier and nutrient inefficiency model to analyse determinants of MB-based EE. The empirical study applies both techniques to investigate MB-based EE of 96 rice farms in South Korea. The size of land, fertiliser consumption intensity, cost allocative efficiency, and the share of owned land out of total land are found to be correlated with MB-based EE. The results confirm the presence of a trade-off between MB-based EE and cost allocative efficiency and this finding, favouring policy interventions to help farms simultaneously achieve cost efficiency and MP-based EE.
Resumo:
This article uses critical discourse analysis to analyse material shifts in the political economy of communications. It examines texts of major corporations to describe four key changes in political economy: (1) the separation of ownership from control; (2) the separation of business from industry; (3) the separation of accountability from responsibility; and (4) the subjugation of ‘going concerns’ by overriding concerns. The authors argue that this amounts to a political economic shift from traditional concepts of ‘capitalism’ to a new ‘corporatism’ in which the relationships between public and private, state and individual interests have become redefined and obscured through new discourse strategies. They conclude that the present financial and regulatory ‘crisis’ cannot be adequately resolved without a new analytic framework for examining the relationships between corporation, discourse and political economy.
Resumo:
The latest paradigm shift in government, termed Transformational Government, puts the citizen in the centre of attention. Including citizens in the design of online one-stop portals can help governmental organisations to become more customer focussed. This study describes the initial efforts of an Australian state government to develop an information architecture to structure the content of their future one-stop portal. Hereby, card sorting exercises have been conducted and analysed, utilising contemporary approaches found in academic and non-scientific literature. This paper describes the findings of the card sorting exercises in this particular case and discusses the suitability of the applied approaches in general. These are distinguished into non-statistical, statistical, and hybrid approaches. Thus, on the one hand, this paper contributes to academia by describing the application of different card sorting approaches and discussing their strengths and weaknesses. On the other hand, this paper contributes to practice by explaining the approach that has been taken by the authors’ research partner in order to develop a customer-focussed governmental one-stop portal. Thus, they provide decision support for practitioners with regard to different analysis methods that can be used to complement recent approaches in Transformational Government.
Resumo:
This paper details the participation of the Australian e- Health Research Centre (AEHRC) in the ShARe/CLEF 2013 eHealth Evaluation Lab { Task 3. This task aims to evaluate the use of information retrieval (IR) systems to aid consumers (e.g. patients and their relatives) in seeking health advice on the Web. Our submissions to the ShARe/CLEF challenge are based on language models generated from the web corpus provided by the organisers. Our baseline system is a standard Dirichlet smoothed language model. We enhance the baseline by identifying and correcting spelling mistakes in queries, as well as expanding acronyms using AEHRC's Medtex medical text analysis platform. We then consider the readability and the authoritativeness of web pages to further enhance the quality of the document ranking. Measures of readability are integrated in the language models used for retrieval via prior probabilities. Prior probabilities are also used to encode authoritativeness information derived from a list of top-100 consumer health websites. Empirical results show that correcting spelling mistakes and expanding acronyms found in queries signi cantly improves the e ectiveness of the language model baseline. Readability priors seem to increase retrieval e ectiveness for graded relevance at early ranks (nDCG@5, but not precision), but no improvements are found at later ranks and when considering binary relevance. The authoritativeness prior does not appear to provide retrieval gains over the baseline: this is likely to be because of the small overlap between websites in the corpus and those in the top-100 consumer-health websites we acquired.
Resumo:
The Australian e-Health Research Centre (AEHRC) recently participated in the ShARe/CLEF eHealth Evaluation Lab Task 1. The goal of this task is to individuate mentions of disorders in free-text electronic health records and map disorders to SNOMED CT concepts in the UMLS metathesaurus. This paper details our participation to this ShARe/CLEF task. Our approaches are based on using the clinical natural language processing tool Metamap and Conditional Random Fields (CRF) to individuate mentions of disorders and then to map those to SNOMED CT concepts. Empirical results obtained on the 2013 ShARe/CLEF task highlight that our instance of Metamap (after ltering irrelevant semantic types), although achieving a high level of precision, is only able to identify a small amount of disorders (about 21% to 28%) from free-text health records. On the other hand, the addition of the CRF models allows for a much higher recall (57% to 79%) of disorders from free-text, without sensible detriment in precision. When evaluating the accuracy of the mapping of disorders to SNOMED CT concepts in the UMLS, we observe that the mapping obtained by our ltered instance of Metamap delivers state-of-the-art e ectiveness if only spans individuated by our system are considered (`relaxed' accuracy).
Resumo:
Australian authorities have set ambitious policy objectives to shift Australia’s current transport profile of heavy reliance on private motor cars to sustainable modes. Improving accessibility of public transport is a central component of that objective. Past studies on accessibility to public transport focus on walking time and/or waiting time. However, travellers’ perceptions of the interface leg journeys may depend not only on these direct and tangible factors but also on social and psychological factors. This paper extends previous research that identified five salient perspectives of rail access by means of a statement sorting activity and cluster analysis with a small sample of rail passengers in three Australian cities (Zuniga et al, 2013). This study collects a new data set including 144 responses from Brisbane and Melbourne to an online survey made up of a Likert-scaled statement sorting exercise and questionnaire. It employs factor analysis to examine the statement rankings and uncovers seven underlying factors in the exploratory manner, i.e., station, safety, access, transfer, service attitude, traveler’s physical activity levels, and environmental concern. Respondents from groups stratified by rail use frequency are compared in terms of their scores of those factors. Findings from this study indicate a need to re-conceptualize accessibility to intra-urban rail travel in agreement with current policy agenda, and to target behavioral intervention to multiple dimensions of accessibility influencing passengers’ travel choices. Arguments in this paper are not limited to intra-urban rail transit, but may also be relevant to public transport in general.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Although the tourism industry has been dramatically altered due to the Internet, there has been limited research published about international entrepreneurial values and Internet use in tourism firms. The findings of this study point to a relationship between the values of Internet-enabled international entrepreneurs in small-sized to medium-sized enterprises and the inclination of the firm to develop and initiate international activity. The findings of this study suggest that Internet-enabled tourism entrepreneurs share similar construct values. Two effective but underutilized qualitative methods were used in this study. The first method, repertory test, is an efficient technique for exploring constructs in decision making; the second method, laddering analysis, facilitates understanding of the perceived consequences and personal values guiding behaviour.
Resumo:
Bacterial siderophores are a group of chemically diverse, virulence-associated secondary metabolites whose expression exerts metabolic costs. A combined bacterial genetic and metabolomic approach revealed differential metabolomic impacts associated with biosynthesis of different siderophore structural families. Despite myriad genetic differences, the metabolome of a cheater mutant lacking a single set of siderophore biosynthetic genes more closely approximate that of a nonpathogenic K12 strain than its isogenic, uropathogen parent strain. Siderophore types associated with greater metabolomic perturbations are less common among human isolates, suggesting that metabolic costs influence success in a human population. Although different siderophores share a common iron acquisition function, our analysis shows how a metabolomic approach can distinguish their relative metabolic impacts in E.coli.
Resumo:
There are currently more than 400 cities operating bike share programs. Purported benefits of bike share programs include flexible mobility, physical activity, reduced congestion, emissions and fuel use. Implicit or explicit in the calculation of program benefits are assumptions regarding the modes of travel replaced by bike share journeys. This paper examines the degree to which car trips are replaced by bike share, through an examination of survey and trip data from bike share programs in Melbourne, Brisbane, Washing, D.C., London, and Minneapolis/St. Paul. A secondary and unique component of this analysis examines motor vehicle support services required for bike share fleet rebalancing and maintenance. These two components are then combined to estimate bike share’s overall contribution to changes in vehicle kilometres traveled. The results indicate that the estimated mean reduction in car use due to bike share is at least twice the distance covered by operator support vehicles, with the exception of London, in which the relationship is reversed, largely due to a low car mode substitution rate. As bike share programs mature, evaluation of their effectiveness in reducing car use may become increasingly important. This paper reveals that by increasing the convenience of bike share relative to car use and by improving perceptions of safety, the capacity of bike share programs to reduce vehicle trips and yield overall net benefits will be enhanced. Researchers can adapt the analytical approach proposed in this paper to assist in the evaluation of current and future bike share programs.
Resumo:
Ideals of productivist agriculture in the Western world have faded as the unintended consequences of intensive agriculture and pastoralism have contributed to rural decline and environmental problems. In Norway and Australia, there has been an increasing acceptance of the equal importance of social and environmental sustainability as well as economic sustainability. Alongside this shift is a belief that primary production needs to move away from an intensive, productivist-based agriculture to one that may be defined as post-productivist. In this paper, we argue that the dualism of productivism and post-productivism as concepts on agricultural policy regimes are too simplistic and discuss whether multifunctional agriculture is a better concept for a comparison of rural primary production at two extreme points of the scale, the market-oriented, liberalistic Australian agriculture and the market-protected small-scale Norwegian agriculture. We argue that multifunctionality in Australia rates relatively weakly as an ideology or policy and even less as a discourse or practice and hence is situated toward a ‘weak’ end of a continuum of a level of multifunctional agriculture. In Norwegian agriculture, multifunctional agriculture has thrived within a protectionist setting with the support of the public, the state and agricultural actors. In this sense it is very clearly a policy, practice and discourse that aims to preserve and conserve rural spaces, the cultural landscape, the farming way of life and food safety. Norway is as such situated toward a ‘strong’ end of a continuum of a level of multifunctional agriculture.
Resumo:
Despite continued growth over recent decades, travel journalism has so far gained little attention in journalism research, with scholars often ridiculing it and other forms of lifestyle journalism as not being real journalism. This paper aims to the shift the focus by arguing that non-news journalism is increasingly important as a site for research. It reports the results from a content analysis of Australian newspaper travel sections and examines the role they play in mediating foreign places. The results demonstrate that travel stories can be mostly classed as service stories in that they focus on destinations which are already popular with Australians. At the same time they report very little about local cultures at the destinations, demonstrating a focus on the tourist experience and a missed opportunity for improving inter-cultural understanding. A visual analysis of photographs shows stereotypical portrayals of destinations broadly in line with tourism promotion materials.
Resumo:
Several analytical methods for Dynamic System Optimum (DSO) assignment have been proposed but they are basically classified into two kinds. This chapter attempts to establish DSO by equilbrating the path dynamic marginal time (DMT). The authors analyze the path DMT for a single path with tandem bottlenecks and showed that the path DMT is not the simple summation of DMT associated with each bottleneck along the path. Next, the authors examined the DMT of several paths passing through a common bottleneck. It is shown that the externality at the bottleneck is shared by the paths in proportion to their demand from the current time until the queue vanishes. This share of the externality is caused by the departure rate shift under first in first out (FIFO) and the externality propagates to the downstream bottlenecks. However, the externalities propagates to the downstream are calculated out if downstream bottlenecks exist. Therefore, the authors concluded that the path DMT can be evaluated without considering the propagation of the externalities, but just as in the evaluation of the path DMT for a single path passing through a series of bottlenecks between the origin and destination. Based on the DMT analysis, the authors finally proposed a heuristic solution algorithm and verified it by comparing the numerical solution with the analytical one.
Resumo:
For the past decade, at least, varieties of small, hand held networked instruments have appeared on the global scene, selling in record numbers, and being utilized by all manner of persons from the old to the young; children, women, men, the wealthy and the poor and in all countries. Their presences bespeak a radical shift in telecommunications infrastructure and the future of communications. They are particularly visible in urban areas where mobile transmission network infrastructure (3G, 4G, cellular and Wi-Fi) is more established and substantial, options more plentiful, and density of populations more dramatic. These end user products—I phones, cell phones, Blackberries, DSi, DS, IPads, Zooms, and others – of the mobile communications industry are the latest, hottest globalized commodities. At the same time, wirelessness, or the state of being wireless, and therefore capable of taking along one's networks, communicating from unlikely spaces, and navigating with GPS, is a complex social, political and economic communications phenomenon of early 21st century life. This thesis examines the specter of being wireless in cities. It lends the entire idea an experimentally envisioned, historical and planned context wherein personalization of media tools is seen both as a design development of corporate, artistic, and military imagination, as well as a profound social phenomenon enabling new forms of sharing, belonging, and urban community. In doing that it asserts the parameters of a new mobile space which, aside from clear benefits to humankind by way of mobility, has reinscribed numerous categories including gender. Moreover, it posits the recognition of other, more nuanced theoretical spaces for complex readings of gender and gendered use, including some instantiation of the notion of 'network' itself as a cyborgian and gendered social form. Additionally, cities are studied as places where technology is not only quickly popularized, but is connected to larger political interests, such as the reading of data, tracking of information, and the new security culture. In so doing the work has been undertaken as an urban spatial analysis and experimental ethnography, utilizing architectural, feminist, techno-utopian, industrial and theoretical literatures as discursive underpinnings from whence understandings and interpretations of mobile space, the mobile office, networked mobility, and personal media have come, linking the space of cities to specific, pioneering urban public art projects in which voice, texting and MMS have been utilized in expressions of ubiquitous networks and urban history. Through numerous examples of techno art, the thesis discusses the 'wireless city' as an emerging cultural, socially constructed economic and spatial entity, both conceived and formed through historic processes of urbanization.